๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Foundations of Cryptography: Volume 2, Basic Applications

โœ Scribed by Oded Goldreich


Publisher
Cambridge University Press
Year
2009
Tongue
English
Leaves
449
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Also available: Volume I: Basic Tools 0-521-79172-3 Hardback $75.00 C

โœฆ Table of Contents


Foundations of Cryptography II Basic Applications......Page 4
Contents II Basic Applications......Page 8
List of Figures......Page 12
Preface......Page 14
Acknowledgments......Page 22
5 Encryption Schemes......Page 24
5.1. The Basic Setting......Page 25
5.2. De.nitions of Security......Page 29
5.3. Constructions of Secure Encryption Schemes......Page 54
5.4. Beyond Eavesdropping Security......Page 73
5.5. Miscellaneous......Page 125
6 Digital Signatures and Message Authentication......Page 148
6.1. The Setting and De.nitional Issues......Page 149
6.2. Length-Restricted Signature Scheme......Page 158
6.3. Constructions of Message-Authentication Schemes......Page 174
6.4. Constructions of Signature Schemes......Page 188
6.5.
Some Additional Properties......Page 226
6.6. Miscellaneous......Page 235
7 General Cryptographic Protocols......Page 250
7.1. Overview......Page 251
7.2. The Two-Party Case: De.nitions......Page 266
7.3.
Privately Computing (Two-Party) Functionalities......Page 285
7.4. Forcing (Two-Party) Semi-Honest Behavior......Page 301
7.5.
Extension to the Multi-Party Case......Page 344
7.6.* Perfect Security in the Private Channel Model......Page 392
7.7. Miscellaneous......Page 398
C.1. Enhanced Trapdoor Permutations......Page 416
C.3. On Strong Witness Indistinguishability......Page 419
C.4. On Non-Interactive Zero-Knowledge......Page 423
C.5. Some Developments Regarding Zero-Knowledge......Page 426
C.6. Additional Corrections and Comments......Page 434
C.7. Additional Mottoes......Page 435
Bibliography......Page 436
Index......Page 446


๐Ÿ“œ SIMILAR VOLUMES


Foundations of cryptography. Vol.2, Basi
โœ Oded Goldreich ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Cambridge University Press ๐ŸŒ English

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations

Foundations of Cryptography: Volume 1, B
โœ Oded Goldreich ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Cambridge University Press ๐ŸŒ English

After reading some of chapters, it seems to me that it is a bit difficult to understand even some easy concepts. The book is rich, but again it lacks of good explanations at some points.

Foundations of cryptography, Basic tools
โœ Oded Goldreich ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Cambridge University Press ๐ŸŒ English

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existin