Advances in Cryptology — CRYPTO’ 88: Proceedings
✍ Scribed by Claude Crépeau, Joe Kilian (auth.), Shafi Goldwasser (eds.)
- Publisher
- Springer-Verlag New York
- Year
- 1990
- Tongue
- English
- Leaves
- 587
- Series
- Lecture Notes in Computer Science 403
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
The papers in this volume were presented at the CRYPTO '88 conference on theory and applications of cryptography, held in Santa Barbara, California, August 21-25, 1988. The papers were chosen for their perceived originality and often represent preliminary reports on continuing reserach. The main sections deal with the following topics: Zero-Knowledge, Number Theory, Pseudorandomness, Signatures, Complexity, Protocols, Security, Cryptoanalysis. As such, they will give the committed reader a unique insight into the very latest developments in the field.
✦ Table of Contents
Weakening Security Assumptions and Oblivious Transfer....Pages 2-7
Limits on the Provable Consequences of One-way Permutations....Pages 8-26
Generalized Secret Sharing and Monotone Functions....Pages 27-35
Everything Provable is Provable in Zero-Knowledge....Pages 37-56
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm....Pages 57-70
Zero-Knowledge With Finite State Verifiers....Pages 71-75
Intractable Problems in Number Theory....Pages 77-93
A Family of Jacobians Suitable for Discrete Log Cryptosystems....Pages 94-99
Computation of Approximate L-th Roots Modulo n and Application to Cryptography....Pages 100-117
On the McEliece Public-Key Cryptosystem....Pages 119-131
A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers....Pages 132-144
On the Existence of Pseudorandom Generators....Pages 146-162
On The Randomness of Legendre and Jacobi Sequences....Pages 163-172
Efficient, Perfect Random Number Generators....Pages 173-198
How To Sign Given Any Trapdoor Function....Pages 200-215
A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge....Pages 216-231
A Modification of the Fiat-Shamir Scheme....Pages 232-243
An Improvement of the Fiat-Shamir Identification and Signature Scheme....Pages 244-247
A Basic Theory of Public and Private Cryptosystems....Pages 249-255
Proving Security Against Chosen Ciphertext Attacks....Pages 256-268
Non-Interactive Zero-Knowledge with Preprocessing....Pages 269-282
The Noisy Oracle Problem....Pages 284-296
On Generating Solved Instances of Computational Problems....Pages 297-310
Bounds and Constructions for Authentication - Secrecy Codes with Splitting....Pages 311-317
Untraceable Electronic Cash....Pages 319-327
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals....Pages 328-335
A Universal Problem in Secure and Verifiable Distributed Computation....Pages 336-352
An Abstract Theory of Computer Viruses....Pages 354-374
Abuses in Cryptography and How to Fight Them....Pages 375-389
How to (Really) Share a Secret....Pages 390-448
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition....Pages 450-468
On the Linear Syndrome Method in Cryptanalysis....Pages 469-478
Aperiodic Linear Complexities of de Bruijn Sequences....Pages 479-482
The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities....Pages 484-496
Speeding Up Secret Computations with Insecure Auxiliary Devices....Pages 497-506
Developing Ethernet Enhanced-Security System....Pages 507-519
A Secure Audio Teleconference System....Pages 520-528
Diffie-Hellman is as Strong as Discrete Log for Certain Primes....Pages 530-539
Secret Error-Correcting Codes (SECC)....Pages 540-563
The Detection of Cheaters in Threshold Schemes....Pages 564-577
On the Power of 1-way Functions....Pages 578-579
“Practical IP” ⊆ MA....Pages 580-582
Zero-Knowledge Authentication Scheme with Secret Key Exchange....Pages 583-588
✦ Subjects
Data Encryption; Coding and Information Theory; Computer Communication Networks; Business Information Systems; Probability Theory and Stochastic Processes; Statistics, general
📜 SIMILAR VOLUMES
<span>The papers in this volume were presented at the CRYPTO '88 conference on theory and applications of cryptography, held in Santa Barbara, California, August 21-25, 1988. The papers were chosen for their perceived originality and often represent preliminary reports on continuing reserach. The ma
<p>This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. Th
This book is the proceedings of CRYPTO '87, one in a series of annual conferences devoted to cryptologic research. CRYPTO '87 was attended by 170 people representing 19 countries. The papers in this volume are presented in seven sections. The first six sections comprise all of the papers on the regu
<p>CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume p