logo资料库

Foundations of Cryptography Vol 2 Basic Applications.pdf

第1页 / 共449页
第2页 / 共449页
第3页 / 共449页
第4页 / 共449页
第5页 / 共449页
第6页 / 共449页
第7页 / 共449页
第8页 / 共449页
资料共449页,剩余部分请下载后查看
Foundations of Cryptography II Basic Applications
Contents II Basic Applications
List of Figures
Preface
Acknowledgments
5 Encryption Schemes
5.1. The Basic Setting
5.2. De.nitions of Security
5.3. Constructions of Secure Encryption Schemes
5.4.* Beyond Eavesdropping Security
5.5. Miscellaneous
6 Digital Signatures and Message Authentication
6.1. The Setting and De.nitional Issues
6.2. Length-Restricted Signature Scheme
6.3. Constructions of Message-Authentication Schemes
6.4. Constructions of Signature Schemes
6.5.* Some Additional Properties
6.6. Miscellaneous
7 General Cryptographic Protocols
7.1. Overview
7.2.* The Two-Party Case: De.nitions
7.3.* Privately Computing (Two-Party) Functionalities
7.4.* Forcing (Two-Party) Semi-Honest Behavior
7.5.* Extension to the Multi-Party Case
7.6.* Perfect Security in the Private Channel Model
7.7. Miscellaneous
Appendix C: Corrections and Additions to Volume 1
C.1. Enhanced Trapdoor Permutations
C.2. On Variants of Pseudorandom Functions
C.3. On Strong Witness Indistinguishability
C.4. On Non-Interactive Zero-Knowledge
C.5. Some Developments Regarding Zero-Knowledge
C.6. Additional Corrections and Comments
C.7. Additional Mottoes
Bibliography
Index
Foundations of Cryptography Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad hoc approaches. This second volume contains a rigorous treatment of three basic applications: en- cryption, signatures, and general cryptographic protocols. It builds on the previous volume, which provides a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Oded Goldreich is Professor of Computer Science at the Weizmann Institute of Science and incumbent of the Meyer W. Weisgal Professorial Chair. An active researcher, he has written numerous papers on cryptography and is widely considered to be one of the world experts in the area. He is an editor of Journal of Cryptology and SIAM Journal on Computing and the author of Modern Cryptography, Probabilistic Proofs and Pseudorandomness.
Foundations of Cryptography II Basic Applications Oded Goldreich Weizmann Institute of Science
Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi CAMBRIDGE UNIVERSITY PRESS Cambridge University Press The Edinburgh Building, Cambridge CB2 8RU, UK Published in the United States of America by Cambridge University Press, New York Information on this title: www.cambridge.org/9780521119917 www.cambridge.org © Oded Goldreich 2004 This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published 2004 This digitally printed version 2009 A catalogue record for this publication is available from the British Library ISBN 978-0-521-83084-3 hardback ISBN 978-0-521-11991-7 paperback
To Dana
Contents II Basic Applications List of Figures Preface Acknowledgments 5 Encryption Schemes 5.1. The Basic Setting 5.1.1. Private-Key Versus Public-Key Schemes 5.1.2. The Syntax of Encryption Schemes 5.2. Definitions of Security Indistinguishability of Encryptions 5.2.1. Semantic Security 5.2.2. 5.2.3. Equivalence of the Security Definitions 5.2.4. Multiple Messages 5.2.5.* A Uniform-Complexity Treatment 5.3. Constructions of Secure Encryption Schemes 5.3.1.* Stream-Ciphers 5.3.2. Preliminaries: Block-Ciphers 5.3.3. Private-Key Encryption Schemes 5.3.4. Public-Key Encryption Schemes 5.4.* Beyond Eavesdropping Security 5.4.1. Overview 5.4.2. Key-Dependent Passive Attacks 5.4.3. Chosen Plaintext Attack 5.4.4. Chosen Ciphertext Attack 5.4.5. Non-Malleable Encryption Schemes 5.5. Miscellaneous 5.5.1. On Using Encryption Schemes 5.5.2. On Information-Theoretic Security 5.5.3. On Some Popular Schemes vii page xi xiii xxi 373 374 375 376 378 379 382 383 389 394 403 404 408 410 413 422 422 425 431 438 470 474 474 476 477
分享到:
收藏