TY - GEN N2 - This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. AB - This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. T1 - Introduction to security reduction / DA - [2018] CY - Cham, Switzerland : AU - Guo, Fuchun, AU - Susilo, Willy, AU - Mu, Yi, CN - QA76.9.A25 PB - Springer, PP - Cham, Switzerland : PY - [2018] ID - 843854 KW - Data encryption (Computer science) KW - Computer security. KW - Cryptography. SN - 9783319930497 SN - 3319930494 TI - Introduction to security reduction / LK - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-93049-7 UR - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-93049-7 ER -