Theory of Cryptography
Springer Berlin (Verlag)
978-3-540-70935-0 (ISBN)
Encryption I.- Does Privacy Require True Randomness?.- Tackling Adaptive Corruptions in Multicast Encryption Protocols.- Universally Composable Security.- Long-Term Security and Universal Composability.- Universally Composable Security with Global Setup.- Arguments and Zero Knowledge.- Parallel Repetition of Computationally Sound Protocols Revisited.- Lower Bounds for Non-interactive Zero-Knowledge.- Perfect NIZK with Adaptive Soundness.- Notions of Security.- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.- On the Necessity of Rewinding in Secure Multiparty Computation.- On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.- Obfuscation.- On Best-Possible Obfuscation.- Obfuscation for Cryptographic Purposes.- Securely Obfuscating Re-encryption.- Secret Sharing and Multiparty Computation.- Weakly-Private Secret Sharing Schemes.- On Secret Sharing Schemes, Matroids and Polymatroids.- Secure Linear Algebra Using Linearly Recurrent Sequences.- Towards Optimal and Efficient Perfectly Secure Message Transmission.- Signatures and Watermarking.- Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.- Designated Confirmer Signatures Revisited.- From Weak to Strong Watermarking.- Private Approximation and Black-Box Reductions.- Private Approximation of Clustering and Vertex Cover.- Robuster Combiners for Oblivious Transfer.- One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments.- Towards a Separation of Semantic and CCA Security for Public Key Encryption.- Key Establishment.- Unifying Classical and Quantum Key Distillation.- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.- (Password) Authenticated Key Establishment:From 2-Party to Group.- Encryption II.- Multi-authority Attribute Based Encryption.- Conjunctive, Subset, and Range Queries on Encrypted Data.- How to Shuffle in Public.- Evaluating Branching Programs on Encrypted Data.
Erscheint lt. Verlag | 7.2.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 595 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 848 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • cryprographic protocols • Cryptanalysis • cryptographic paradigms • cryptographic primitives • cryptography • Cryptology • DES • digital signature schemes • Encryption • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • interactive hashing • Lower Bounds • multicast encryption • Multi-Party Computation • obfuscation • oblivious transfer • privacy • pseudo-random functions • public key encryption • Secret Sharing • secure computation • security • Zero Knowledge |
ISBN-10 | 3-540-70935-5 / 3540709355 |
ISBN-13 | 978-3-540-70935-0 / 9783540709350 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich