Foundations of cryptography: 2 Basic applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge Univ. Press
2004
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | XXII, S.373 - S.798 |
ISBN: | 0521830842 9780521830843 9780521119917 |
Internformat
MARC
LEADER | 00000nam a2200000 cc4500 | ||
---|---|---|---|
001 | BV019889453 | ||
003 | DE-604 | ||
005 | 20120301 | ||
007 | t | ||
008 | 050719s2004 |||| 00||| eng d | ||
020 | |a 0521830842 |9 0-521-83084-2 | ||
020 | |a 9780521830843 |c hardback |9 978-0-521-83084-3 | ||
020 | |a 9780521119917 |c paperback |9 978-0-521-11991-7 | ||
035 | |a (OCoLC)314541563 | ||
035 | |a (DE-599)BVBBV019889453 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-355 |a DE-83 |a DE-188 |a DE-634 |a DE-29T |a DE-739 | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
100 | 1 | |a Goldreich, Oded |d 1957- |e Verfasser |0 (DE-588)120549255 |4 aut | |
245 | 1 | 0 | |a Foundations of cryptography |n 2 |p Basic applications |c Oded Goldreich |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2004 | |
300 | |a XXII, S.373 - S.798 | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
610 | 2 | 7 | |a Gothaer Lebensversicherung AG |0 (DE-588)10108596-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
651 | 7 | |a Abrahám |g Slowakei |0 (DE-588)4000185-4 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Gothaer Lebensversicherung AG |0 (DE-588)10108596-5 |D b |
689 | 0 | 1 | |a Abrahám |g Slowakei |0 (DE-588)4000185-4 |D g |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
773 | 0 | 8 | |w (DE-604)BV019889424 |g 2 |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013213487&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013213487 |
Datensatz im Suchindex
_version_ | 1804133423574417408 |
---|---|
adam_text | Contents
II Basic Applications
List of Figures page xi
Preface xiii
Acknowledgments xxi
5 Encryption Schemes 373
5.1. The Basic Setting 374
5.1.1. Private Key Versus Public Key Schemes 375
5.1.2. The Syntax of Encryption Schemes 376
5.2. Definitions of Security 378
5.2.1. Semantic Security 379
5.2.2. Indistinguishability of Encryptions 382
5.2.3. Equivalence of the Security Definitions 383
5.2.4. Multiple Messages 389
5.2.5.* A Uniform Complexity Treatment 394
5.3. Constructions of Secure Encryption Schemes 403
5.3.1.* Stream Ciphers 404
5.3.2. Preliminaries: Block Ciphers 408
5.3.3. Private Key Encryption Schemes 410
5.3.4. Public Key Encryption Schemes 413
5.4.* Beyond Eavesdropping Security 422
5.4.1. Overview 422
5.4.2. Key Dependent Passive Attacks 425
5.4.3. Chosen Plaintext Attack 431
5.4.4. Chosen Ciphertext Attack 438
5.4.5. Non Malleable Encryption Schemes 470
5.5. Miscellaneous 474
5.5.1. On Using Encryption Schemes 474
5.5.2. On Information Theoretic Security 476
5.5.3. On Some Popular Schemes 477
vii
CONTENTS
5.5.4. Historical Notes 478
5.5.5. Suggestions for Further Reading 480
5.5.6. Open Problems 481
5.5.7. Exercises 481
6 Digital Signatures and Message Authentication 497
6.1. The Setting and Definitional Issues 498
6.1.1. The Two Types of Schemes: A Brief Overview 498
6.1.2. Introduction to the Unified Treatment 499
6.1.3. Basic Mechanism 501
6.1.4. Attacks and Security 502
6.1.5.* Variants 505
6.2. Length Restricted Signature Scheme 507
6.2.1. Definition 507
6.2.2. The Power of Length Restricted Signature Schemes 508
6.2.3.* Constructing Collision Free Hashing Functions 516
6.3. Constructions of Message Authentication Schemes 523
6.3.1. Applying a Pseudorandom Function to the Document 523
6.3.2.* More on Hash and Hide and State Based MACs 531
6.4. Constructions of Signature Schemes 537
6.4.1. One Time Signature Schemes 538
6.4.2. From One Time Signature Schemes to General Ones 543
6.4.3.* Universal One Way Hash Functions and Using Them 560
6.5.* Some Additional Properties 575
6.5.1. Unique Signatures 575
6.5.2. Super Secure Signature Schemes 576
6.5.3. Off Line/On Line Signing 580
6.5.4. Incremental Signatures 581
6.5.5. Fail Stop Signatures 583
6.6. Miscellaneous 584
6.6.1. On Using Signature Schemes 584
6.6.2. On Information Theoretic Security 585
6.6.3. On Some Popular Schemes 586
6.6.4. Historical Notes 587
6.6.5. Suggestions for Further Reading 589
6.6.6. Open Problems 590
6.6.7. Exercises 590
7 General Cryptographic Protocols 599
7.1. Overview 600
7.1.1. The Definitional Approach and Some Models 601
7.1.2. Some Known Results 607
7.1.3. Construction Paradigms 609
viii
CONTENTS
7.2.* The Two Party Case: Definitions 615
7.2.1. The Syntactic Framework 615
7.2.2. The Semi Honest Model 619
7.2.3. The Malicious Model 626
7.3.* Privately Computing (Two Party) Functionalities 634
7.3.1. Privacy Reductions and a Composition Theorem 636
7.3.2. The OTf Protocol: Definition and Construction 640
7.3.3. Privately Computing c + c2 = (a i + a2) ¦ (b + b2) 643
7.3.4. The Circuit Evaluation Protocol 645
7.4.* Forcing (Two Party) Semi Honest Behavior 650
7.4.1. The Protocol Compiler: Motivation and Overview 650
7.4.2. Security Reductions and a Composition Theorem 652
7.4.3. The Compiler: Functionalities in Use 657
7.4.4. The Compiler Itself 681
7.5.* Extension to the Multi Party Case 693
7.5.1. Definitions 694
7.5.2. Security in the Semi Honest Model 701
7.5.3. The Malicious Models: Overview and Preliminaries 708
7.5.4. The First Compiler: Forcing Semi Honest Behavior 714
7.5.5. The Second Compiler: Effectively Preventing Abort 729
7.6.* Perfect Security in the Private Channel Model 741
7.6.1. Definitions 742
7.6.2. Security in the Semi Honest Model 743
7.6.3. Security in the Malicious Model 746
7.7. Miscellaneous 747
7.7.1.* Three Deferred Issues 747
7.7.2.* Concurrent Executions 752
7.7.3. Concluding Remarks 755
7.7.4. Historical Notes 756
7.7.5. Suggestions for Further Reading 757
7.7.6. Open Problems 758
7.7.7. Exercises 759
Appendix C: Corrections and Additions to Volume 1 765
C.I. Enhanced Trapdoor Permutations 765
C.2. On Variants of Pseudorandom Functions 768
C.3. On Strong Witness Indistinguishability 768
C.3.1. On Parallel Composition 769
C.3.2. On Theorem 4.6.8 and an Afterthought 770
C.3.3. Consequences 771
C.4. On Non Interactive Zero Knowledge 772
C.4.1. On NIZKs with Efficient Prover Strategies 772
C.4.2. On Unbounded NIZKs 773
C.4.3. On Adaptive NIZKs 774
IX
CONTENTS
C.5. Some Developments Regarding Zero Knowledge 775
C.5.1. Composing Zero Knowledge Protocols 775
C.5.2. Using the Adversary s Program in the Proof of Security 780
C.6. Additional Corrections and Comments 783
C.7. Additional Mottoes 784
Bibliography 785
Index 795
Note: Asterisks indicate advanced material.
|
any_adam_object | 1 |
author | Goldreich, Oded 1957- |
author_GND | (DE-588)120549255 |
author_facet | Goldreich, Oded 1957- |
author_role | aut |
author_sort | Goldreich, Oded 1957- |
author_variant | o g og |
building | Verbundindex |
bvnumber | BV019889453 |
classification_rvk | SK 170 |
ctrlnum | (OCoLC)314541563 (DE-599)BVBBV019889453 |
discipline | Mathematik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01782nam a2200433 cc4500</leader><controlfield tag="001">BV019889453</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050719s2004 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0521830842</subfield><subfield code="9">0-521-83084-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521830843</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-521-83084-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521119917</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-521-11991-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)314541563</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019889453</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Goldreich, Oded</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)120549255</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of cryptography</subfield><subfield code="n">2</subfield><subfield code="p">Basic applications</subfield><subfield code="c">Oded Goldreich</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge Univ. Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, S.373 - S.798</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">Gothaer Lebensversicherung AG</subfield><subfield code="0">(DE-588)10108596-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Abrahám</subfield><subfield code="g">Slowakei</subfield><subfield code="0">(DE-588)4000185-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Gothaer Lebensversicherung AG</subfield><subfield code="0">(DE-588)10108596-5</subfield><subfield code="D">b</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Abrahám</subfield><subfield code="g">Slowakei</subfield><subfield code="0">(DE-588)4000185-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV019889424</subfield><subfield code="g">2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013213487&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013213487</subfield></datafield></record></collection> |
geographic | Abrahám Slowakei (DE-588)4000185-4 gnd |
geographic_facet | Abrahám Slowakei |
id | DE-604.BV019889453 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T20:08:29Z |
institution | BVB |
isbn | 0521830842 9780521830843 9780521119917 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013213487 |
oclc_num | 314541563 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-355 DE-BY-UBR DE-83 DE-188 DE-634 DE-29T DE-739 |
owner_facet | DE-473 DE-BY-UBG DE-355 DE-BY-UBR DE-83 DE-188 DE-634 DE-29T DE-739 |
physical | XXII, S.373 - S.798 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Cambridge Univ. Press |
record_format | marc |
spelling | Goldreich, Oded 1957- Verfasser (DE-588)120549255 aut Foundations of cryptography 2 Basic applications Oded Goldreich 1. publ. Cambridge [u.a.] Cambridge Univ. Press 2004 XXII, S.373 - S.798 txt rdacontent n rdamedia nc rdacarrier Hier auch später erschienene, unveränderte Nachdrucke Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Abrahám Slowakei (DE-588)4000185-4 gnd rswk-swf Gothaer Lebensversicherung AG (DE-588)10108596-5 b Abrahám Slowakei (DE-588)4000185-4 g DE-604 Kryptologie (DE-588)4033329-2 s (DE-604)BV019889424 2 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013213487&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Goldreich, Oded 1957- Foundations of cryptography Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)10108596-5 (DE-588)4033329-2 (DE-588)4000185-4 |
title | Foundations of cryptography |
title_auth | Foundations of cryptography |
title_exact_search | Foundations of cryptography |
title_full | Foundations of cryptography 2 Basic applications Oded Goldreich |
title_fullStr | Foundations of cryptography 2 Basic applications Oded Goldreich |
title_full_unstemmed | Foundations of cryptography 2 Basic applications Oded Goldreich |
title_short | Foundations of cryptography |
title_sort | foundations of cryptography basic applications |
topic | Gothaer Lebensversicherung AG (DE-588)10108596-5 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Gothaer Lebensversicherung AG Kryptologie Abrahám Slowakei |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013213487&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV019889424 |
work_keys_str_mv | AT goldreichoded foundationsofcryptography2 |