Approaches to efficient and robust cryptographic protocols:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Konstanz
Hartung-Gorre
2007
|
Ausgabe: | 1. ed. |
Schriftenreihe: | ETH series in information security and cryptography
9 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | IX, 104 S. |
ISBN: | 9783866281530 3866281536 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023190159 | ||
003 | DE-604 | ||
005 | 20090417 | ||
007 | t | ||
008 | 080228s2007 gw m||| 00||| eng d | ||
015 | |a 07,N30,0066 |2 dnb | ||
015 | |a 08,H02,0068 |2 dnb | ||
016 | 7 | |a 984785183 |2 DE-101 | |
020 | |a 9783866281530 |c kart. : EUR 65.00, sfr 127.10 |9 978-3-86628-153-0 | ||
020 | |a 3866281536 |c kart. : EUR 65.00, sfr 127.10 |9 3-86628-153-6 | ||
024 | 3 | |a 9783866281530 | |
035 | |a (OCoLC)196477554 | ||
035 | |a (DE-599)DNB984785183 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BW | ||
049 | |a DE-12 |a DE-11 | ||
082 | 0 | |a 004.62 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 24,1 |2 ssgn | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Przydatek, Bartosz |e Verfasser |4 aut | |
245 | 1 | 0 | |a Approaches to efficient and robust cryptographic protocols |c Bartosz Przydatek |
250 | |a 1. ed. | ||
264 | 1 | |a Konstanz |b Hartung-Gorre |c 2007 | |
300 | |a IX, 104 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a ETH series in information security and cryptography |v 9 | |
502 | |a Zugl.: Zürich, Techn. Hochsch., Diss., 2007 | ||
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a ETH series in information security and cryptography |v 9 |w (DE-604)BV023116009 |9 9 | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016376567&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016376567 |
Datensatz im Suchindex
_version_ | 1804137461653176320 |
---|---|
adam_text | Contents
Introduction
1
1.1
Secure
multi-party computation
................
З
1.2
Robust combiners
........................ 5
1.3
Contributions of this thesis
.................. 7
1.3.1
Asynchronous multi-party computation
....... 7
1.3.2
Robust combiners of cryptographic primitives
... 9
Asynchronous multi-party computation
11
2.1
Formal model and preliminaries
............... 12
2.1.1
Communication model
................. 12
2.1.2
The general
MPC
model
................ 12
2.1.3
Efficiency measures
................... 14
2.2
Cryptographic primitives and protocols
........... 14
2.2.1
Homomorphic encryption with threshold decryption
15
2.2.2
Digital signatures
.................... 16
2.2.3
Threshold signatures
.................. 16
2.2.4
Byzantine Agreement
................. 17
2.2.5
Cryptographic assumptions
&
instantiations of tools
18
2.3
Kings
&
slaves: cryptographic
MPC
with optimal resilience
18
2.3.1
A high-level overview.
................. 19
2.3.2
Certificates
........................ 20
2.3.3
The circuit and the correctness invariant
...... 24
viii Contents
2.3.4 Main
protocol
...................... 26
2.3.5
Sub-protocols used by the main
protocol
...... 27
2.3.6
Security analysis
.................... 36
2.3.7
Circuits with multiple inputs
............. 40
2.3.8
Efficiency analysis
................... 40
2.4
Better efficiency via threshold signatures
........... 42
2.5
MPC
with quadratic communication
............. 43
2.5.1
Reducing redundancy
................. 44
2.5.2
Generating random triples
.............. 46
2.6
Computing randomized functions
.............. 49
2.7
Computing functions with private outputs
......... 50
2.8
Providing inputs in asynchronous networks
......... 50
3
Robust combiners of cryptographic primitives
53
3.1
Preliminaries
........................... 56
3.1.1
Primitives
........................ 56
3.1.2
Robust combiners
.................... 58
3.1.3
Remarks on constructions of combiners
....... 60
3.1.4
Tools
........................... 61
3.2
Combiners for private information retrieval
......... 64
3.2.1
The basic scheme
.................... 64
3.2.2
PIR-combiners with lower communication
..... 67
3.3
Cross-primitive combiners
................... 69
3.3.1
PIR-to-BC combiner
.................. 70
3.3.2
PIR-to-OT combiner
.................. 72
3.4 Robuster
combiners
f
or oblivious transfer
.......... 76
3.4.1 Robuster
combiners for two-party primitives
.... 76
3.4.2
OT-combiners with secure majority
......... 78
3.4.3
OT-combiners based on the symmetry of
ОТ
.... 81
3.5
Robust combiners
f
or OLFE
.................. 84
3.5.1
OLFE-combiner
..................... 85
3.5.2
Uniform OLFE-combiner based on symmetry
... 88
Contents ix
4
Conclusions
89
4.1
Asynchronous multi-party computation
........... 89
4.2
Robust combiners
........................ 90
Bibliography
93
Index
103
|
adam_txt |
Contents
Introduction
1
1.1
Secure
multi-party computation
.
З
1.2
Robust combiners
. 5
1.3
Contributions of this thesis
. 7
1.3.1
Asynchronous multi-party computation
. 7
1.3.2
Robust combiners of cryptographic primitives
. 9
Asynchronous multi-party computation
11
2.1
Formal model and preliminaries
. 12
2.1.1
Communication model
. 12
2.1.2
The general
MPC
model
. 12
2.1.3
Efficiency measures
. 14
2.2
Cryptographic primitives and protocols
. 14
2.2.1
Homomorphic encryption with threshold decryption
15
2.2.2
Digital signatures
. 16
2.2.3
Threshold signatures
. 16
2.2.4
Byzantine Agreement
. 17
2.2.5
Cryptographic assumptions
&
instantiations of tools
18
2.3
Kings
&
slaves: cryptographic
MPC
with optimal resilience
18
2.3.1
A high-level overview.
. 19
2.3.2
Certificates
. 20
2.3.3
The circuit and the correctness invariant
. 24
viii Contents
2.3.4 Main
protocol
. 26
2.3.5
Sub-protocols used by the main
protocol
. 27
2.3.6
Security analysis
. 36
2.3.7
Circuits with multiple inputs
. 40
2.3.8
Efficiency analysis
. 40
2.4
Better efficiency via threshold signatures
. 42
2.5
MPC
with quadratic communication
. 43
2.5.1
Reducing redundancy
. 44
2.5.2
Generating random triples
. 46
2.6
Computing randomized functions
. 49
2.7
Computing functions with private outputs
. 50
2.8
Providing inputs in asynchronous networks
. 50
3
Robust combiners of cryptographic primitives
53
3.1
Preliminaries
. 56
3.1.1
Primitives
. 56
3.1.2
Robust combiners
. 58
3.1.3
Remarks on constructions of combiners
. 60
3.1.4
Tools
. 61
3.2
Combiners for private information retrieval
. 64
3.2.1
The basic scheme
. 64
3.2.2
PIR-combiners with lower communication
. 67
3.3
Cross-primitive combiners
. 69
3.3.1
PIR-to-BC combiner
. 70
3.3.2
PIR-to-OT combiner
. 72
3.4 Robuster
combiners
f
or oblivious transfer
. 76
3.4.1 Robuster
combiners for two-party primitives
. 76
3.4.2
OT-combiners with secure majority
. 78
3.4.3
OT-combiners based on the symmetry of
ОТ
. 81
3.5
Robust combiners
f
or OLFE
. 84
3.5.1
OLFE-combiner
. 85
3.5.2
Uniform OLFE-combiner based on symmetry
. 88
Contents ix
4
Conclusions
89
4.1
Asynchronous multi-party computation
. 89
4.2
Robust combiners
. 90
Bibliography
93
Index
103 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Przydatek, Bartosz |
author_facet | Przydatek, Bartosz |
author_role | aut |
author_sort | Przydatek, Bartosz |
author_variant | b p bp |
building | Verbundindex |
bvnumber | BV023190159 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)196477554 (DE-599)DNB984785183 |
dewey-full | 004.62 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.62 |
dewey-search | 004.62 |
dewey-sort | 14.62 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01961nam a2200505 cb4500</leader><controlfield tag="001">BV023190159</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090417 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080228s2007 gw m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N30,0066</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,H02,0068</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">984785183</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783866281530</subfield><subfield code="c">kart. : EUR 65.00, sfr 127.10</subfield><subfield code="9">978-3-86628-153-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3866281536</subfield><subfield code="c">kart. : EUR 65.00, sfr 127.10</subfield><subfield code="9">3-86628-153-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783866281530</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)196477554</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB984785183</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.62</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Przydatek, Bartosz</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Approaches to efficient and robust cryptographic protocols</subfield><subfield code="c">Bartosz Przydatek</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Konstanz</subfield><subfield code="b">Hartung-Gorre</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 104 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">ETH series in information security and cryptography</subfield><subfield code="v">9</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Zürich, Techn. Hochsch., Diss., 2007</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">ETH series in information security and cryptography</subfield><subfield code="v">9</subfield><subfield code="w">(DE-604)BV023116009</subfield><subfield code="9">9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016376567&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016376567</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV023190159 |
illustrated | Not Illustrated |
index_date | 2024-07-02T20:04:27Z |
indexdate | 2024-07-09T21:12:40Z |
institution | BVB |
isbn | 9783866281530 3866281536 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016376567 |
oclc_num | 196477554 |
open_access_boolean | |
owner | DE-12 DE-11 |
owner_facet | DE-12 DE-11 |
physical | IX, 104 S. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Hartung-Gorre |
record_format | marc |
series | ETH series in information security and cryptography |
series2 | ETH series in information security and cryptography |
spelling | Przydatek, Bartosz Verfasser aut Approaches to efficient and robust cryptographic protocols Bartosz Przydatek 1. ed. Konstanz Hartung-Gorre 2007 IX, 104 S. txt rdacontent n rdamedia nc rdacarrier ETH series in information security and cryptography 9 Zugl.: Zürich, Techn. Hochsch., Diss., 2007 Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Mehrparteienprotokoll (DE-588)4480818-5 s Kryptosystem (DE-588)4209132-9 s DE-604 ETH series in information security and cryptography 9 (DE-604)BV023116009 9 Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016376567&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Przydatek, Bartosz Approaches to efficient and robust cryptographic protocols ETH series in information security and cryptography Mehrparteienprotokoll (DE-588)4480818-5 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4480818-5 (DE-588)4209132-9 (DE-588)4113937-9 |
title | Approaches to efficient and robust cryptographic protocols |
title_auth | Approaches to efficient and robust cryptographic protocols |
title_exact_search | Approaches to efficient and robust cryptographic protocols |
title_exact_search_txtP | Approaches to efficient and robust cryptographic protocols |
title_full | Approaches to efficient and robust cryptographic protocols Bartosz Przydatek |
title_fullStr | Approaches to efficient and robust cryptographic protocols Bartosz Przydatek |
title_full_unstemmed | Approaches to efficient and robust cryptographic protocols Bartosz Przydatek |
title_short | Approaches to efficient and robust cryptographic protocols |
title_sort | approaches to efficient and robust cryptographic protocols |
topic | Mehrparteienprotokoll (DE-588)4480818-5 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Mehrparteienprotokoll Kryptosystem Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016376567&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV023116009 |
work_keys_str_mv | AT przydatekbartosz approachestoefficientandrobustcryptographicprotocols |