
Parametry
Více o knize
InhaltsverzeichnisZero-Knowledge.Concurrent Zero Knowledge Without Complexity Assumptions.Interactive Zero-Knowledge with Restricted Random Oracles.Non-interactive Zero-Knowledge from Homomorphic Encryption.Primitives.Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles.Efficient Blind and Partially Blind Signatures Without Random Oracles.Key Exchange Using Passwords and Long Keys.Mercurial Commitments: Minimal Assumptions and Efficient Constructions.Assumptions and Models.Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.On Error Correction in the Exponent.On the Relation Between the Ideal Cipher and the Random Oracle Models.The Bounded-Retrieval Model.Intrusion-Resilience Via the Bounded-Storage Model.Perfectly Secure Password Protocols in the Bounded Retrieval Model.Privacy.Polylogarithmic Private Approximations and Efficient Matching.Calibrating Noise to Sensitivity in Private Data Analysis.Secret Sharing and Multi-party Computation (I).Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.Efficient Multi-party Computation with Dispute Control.Round-Optimal and Efficient Verifiable Secret Sharing.Universally-Composible Security.Generalized Environmental Security from Number Theoretic Assumptions.Games and the Impossibility of Realizable Ideal Functionality.Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.Resource Fairness and Composability of Cryptographic Protocols.One-Way Functions and Friends.Finding Pessiland.Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness.On the Complexity of Parallel Hardness Amplification for One-Way Functions.Secret Sharing and Multi-party Computation (II).On Matroids and Non-ideal Secret Sharing.Secure Computation with Partial Message Loss.Communication Efficient Secure Linear Algebra.Threshold and Proactive Pseudo-Random Permutations.Pseudo-Random Functions and Encryption.PRF Domain Extension Using DAGs.Chosen-Ciphertext Security from Tag-Based Encryption.Separating Sources for Encryption and Secret Sharing.
Nákup knihy
Theory of cryptography, Shai Halevi
- Jazyk
- Rok vydání
- 2006
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Theory of cryptography
- Jazyk
- anglicky
- Autoři
- Shai Halevi
- Vydavatel
- Springer
- Rok vydání
- 2006
- ISBN10
- 3540327312
- ISBN13
- 9783540327318
- Kategorie
- Počítače, IT, programování
- Anotace
- InhaltsverzeichnisZero-Knowledge.Concurrent Zero Knowledge Without Complexity Assumptions.Interactive Zero-Knowledge with Restricted Random Oracles.Non-interactive Zero-Knowledge from Homomorphic Encryption.Primitives.Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles.Efficient Blind and Partially Blind Signatures Without Random Oracles.Key Exchange Using Passwords and Long Keys.Mercurial Commitments: Minimal Assumptions and Efficient Constructions.Assumptions and Models.Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.On Error Correction in the Exponent.On the Relation Between the Ideal Cipher and the Random Oracle Models.The Bounded-Retrieval Model.Intrusion-Resilience Via the Bounded-Storage Model.Perfectly Secure Password Protocols in the Bounded Retrieval Model.Privacy.Polylogarithmic Private Approximations and Efficient Matching.Calibrating Noise to Sensitivity in Private Data Analysis.Secret Sharing and Multi-party Computation (I).Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.Efficient Multi-party Computation with Dispute Control.Round-Optimal and Efficient Verifiable Secret Sharing.Universally-Composible Security.Generalized Environmental Security from Number Theoretic Assumptions.Games and the Impossibility of Realizable Ideal Functionality.Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.Resource Fairness and Composability of Cryptographic Protocols.One-Way Functions and Friends.Finding Pessiland.Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness.On the Complexity of Parallel Hardness Amplification for One-Way Functions.Secret Sharing and Multi-party Computation (II).On Matroids and Non-ideal Secret Sharing.Secure Computation with Partial Message Loss.Communication Efficient Secure Linear Algebra.Threshold and Proactive Pseudo-Random Permutations.Pseudo-Random Functions and Encryption.PRF Domain Extension Using DAGs.Chosen-Ciphertext Security from Tag-Based Encryption.Separating Sources for Encryption and Secret Sharing.