Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. The author starts by presenting some of the central tools; that is, computational difficulty (in the form of one-way functions), ps
Foundations of Cryptography: a Primer
β Scribed by Goldreich, Oded
- Publisher
- Now Publishers Inc
- Year
- 2014
- Tongue
- English
- Leaves
- 131
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. The author starts by presenting some of the central tools; that is, computational difficulty (in the form of one-way functions), pseudorandomness, and zero-knowledge proofs. Based on these tools, the emphasis is shifted to the treatment of basic applications such as encryption and signature schemes as well as the design of general secure cryptographic protocols. The author has created a unique overview that includes well over 1.;Introduction and Preliminaries; Introduction; Preliminaries; I Basic Tools; Computational Difficulty and One-way Functions; One-way functions; Hard-core predicates; Pseudorandomness; Computational indistinguishability; Pseudorandom generators; Pseudorandom functions; Zero-Knowledge; The simulation paradigm; The actual definition; Zero-knowledge proofs for all NP-assertions and their applications; Variants and issues; II Basic Applications; Encryption Schemes; Definitions; Constructions; Beyond eavesdropping security; Signature and Message Authentication Schemes; Definitions; Constructions.
β¦ Table of Contents
Introduction and Preliminaries
Introduction
Preliminaries
I Basic Tools
Computational Difficulty and One-way Functions
One-way functions
Hard-core predicates
Pseudorandomness
Computational indistinguishability
Pseudorandom generators
Pseudorandom functions
Zero-Knowledge
The simulation paradigm
The actual definition
Zero-knowledge proofs for all NP-assertions and their applications
Variants and issues
II Basic Applications
Encryption Schemes
Definitions
Constructions
Beyond eavesdropping security
Signature and Message Authentication Schemes
Definitions
Constructions. Public-key infrastructureGeneral Cryptographic Protocols
The definitional approach and some models
Some known results
Construction paradigms and two simple protocols
Concurrent execution of protocols
Concluding remarks
References.
β¦ Subjects
Computational complexity;Computer security;Cryptography;Electronic books
π SIMILAR VOLUMES
<p><p>Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalys
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existin
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cr