Foundations of Cryptography II Basic Applications
Contents II Basic Applications
List of Figures
Preface
Acknowledgments
5 Encryption Schemes
5.1. The Basic Setting
5.2. De.nitions of Security
5.3. Constructions of Secure Encryption Schemes
5.4.* Beyond Eavesdropping Security
5.5. Miscellaneous
6 Digital Signatures and Message Authentication
6.1. The Setting and De.nitional Issues
6.2. Length-Restricted Signature Scheme
6.3. Constructions of Message-Authentication Schemes
6.4. Constructions of Signature Schemes
6.5.* Some Additional Properties
6.6. Miscellaneous
7 General Cryptographic Protocols
7.1. Overview
7.2.* The Two-Party Case: De.nitions
7.3.* Privately Computing (Two-Party) Functionalities
7.4.* Forcing (Two-Party) Semi-Honest Behavior
7.5.* Extension to the Multi-Party Case
7.6.* Perfect Security in the Private Channel Model
7.7. Miscellaneous
Appendix C: Corrections and Additions to Volume 1
C.1. Enhanced Trapdoor Permutations
C.2. On Variants of Pseudorandom Functions
C.3. On Strong Witness Indistinguishability
C.4. On Non-Interactive Zero-Knowledge
C.5. Some Developments Regarding Zero-Knowledge
C.6. Additional Corrections and Comments
C.7. Additional Mottoes
Bibliography
Index