Foundations of Cryptography: Volume 2, Basic Applications
โ Scribed by Oded Goldreich
- Publisher
- Cambridge University Press
- Year
- 2009
- Tongue
- English
- Leaves
- 449
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Also available: Volume I: Basic Tools 0-521-79172-3 Hardback $75.00 C
โฆ Table of Contents
Foundations of Cryptography II Basic Applications......Page 4
Contents II Basic Applications......Page 8
List of Figures......Page 12
Preface......Page 14
Acknowledgments......Page 22
5 Encryption Schemes......Page 24
5.1. The Basic Setting......Page 25
5.2. De.nitions of Security......Page 29
5.3. Constructions of Secure Encryption Schemes......Page 54
5.4. Beyond Eavesdropping Security......Page 73
5.5. Miscellaneous......Page 125
6 Digital Signatures and Message Authentication......Page 148
6.1. The Setting and De.nitional Issues......Page 149
6.2. Length-Restricted Signature Scheme......Page 158
6.3. Constructions of Message-Authentication Schemes......Page 174
6.4. Constructions of Signature Schemes......Page 188
6.5. Some Additional Properties......Page 226
6.6. Miscellaneous......Page 235
7 General Cryptographic Protocols......Page 250
7.1. Overview......Page 251
7.2. The Two-Party Case: De.nitions......Page 266
7.3. Privately Computing (Two-Party) Functionalities......Page 285
7.4. Forcing (Two-Party) Semi-Honest Behavior......Page 301
7.5. Extension to the Multi-Party Case......Page 344
7.6.* Perfect Security in the Private Channel Model......Page 392
7.7. Miscellaneous......Page 398
C.1. Enhanced Trapdoor Permutations......Page 416
C.3. On Strong Witness Indistinguishability......Page 419
C.4. On Non-Interactive Zero-Knowledge......Page 423
C.5. Some Developments Regarding Zero-Knowledge......Page 426
C.6. Additional Corrections and Comments......Page 434
C.7. Additional Mottoes......Page 435
Bibliography......Page 436
Index......Page 446
๐ SIMILAR VOLUMES
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations
After reading some of chapters, it seems to me that it is a bit difficult to understand even some easy concepts. The book is rich, but again it lacks of good explanations at some points.
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existin