upload/bibliotik/0_Other/2/2004 Oded Goldreich - Foundations of Cryptography - VOL2_Basic Applications_Rebfl.pdf
Foundations of Cryptography: Volume 2, Basic Applications 🔍
Goldreich, Oded
Cambridge University Press (Virtual Publishing), Cambridge, England, 2009
英语 [en] · PDF · 3.5MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Also available: Volume I: Basic Tools 0-521-79172-3 Hardback $75.00 C
备用文件名
lgli/Z:\Bibliotik_\15\2\2004 Oded Goldreich - Foundations of Cryptography - VOL2_Basic Applications_Rebfl.pdf
备用文件名
lgrsnf/Z:\Bibliotik_\15\2\2004 Oded Goldreich - Foundations of Cryptography - VOL2_Basic Applications_Rebfl.pdf
备用文件名
nexusstc/Foundations of cryptography. 2, Basic applications/c0fd5bfe6d0a8fa375777bf9b4e81550.pdf
备用文件名
zlib/Computers/Programming/Goldreich, Oded/Foundations of cryptography. 2, Basic applications_5909519.pdf
备选标题
Foundations of Cryptography Volume II Basic Applications
备选标题
Foundations of Cryptography: Basic Application, II
备选标题
Foundations of cryptography : basic tools
备选标题
Foundations of cryptology
备选作者
Oded Goldreich. Vol. 2, Basic applications
备选作者
Oded Goldreich; ProQuest
备用版本
FOUNDATIONS OF CRYPTOGRAPHY; V. 2, NEW YORK, Unknown, 2004-01-01
备用版本
Cambridge University Press, Cambridge, 2001
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Cambridge, England, 2004
备用版本
Cambridge, UK, ©2003
备用版本
New York, Sept. 2009
备用版本
May 10, 2004
备用版本
1, PS, 2004
备用版本
1, 2009
元数据中的注释
lg2628245
元数据中的注释
producers:
Acrobat Distiller 6.0 (Windows)
Acrobat Distiller 6.0 (Windows)
元数据中的注释
{"isbns":["052111991X","0521830842","9780521119917","9780521830843"],"publisher":"Cambridge University Press"}
备用描述
Cover 1
Title 5
Copyright 6
Dedication 7
Contents II Basic Applications 9
List of Figures 13
Preface 15
Acknowledgments 23
5 Encryption Schemes 25
5.1. The Basic Setting 26
5.1.1. Private-Key Versus Public-Key Schemes 27
5.1.2. The Syntax of Encryption Schemes 28
5.2. Definitions of Security 30
5.2.1. Semantic Security 31
5.2.2. Indistinguishability of Encryptions 34
5.2.3. Equivalence of the Security Definitions 35
5.2.4. Multiple Messages 41
5.2.5.* A Uniform-Complexity Treatment 46
5.3. Constructions of Secure Encryption Schemes 55
5.3.1.* Stream-Ciphers 56
5.3.2. Preliminaries: Block-Ciphers 60
5.3.3. Private-Key Encryption Schemes 62
5.3.4. Public-Key Encryption Schemes 65
5.4.* Beyond Eavesdropping Security 74
5.4.1. Overview 74
5.4.2. Key-Dependent Passive Attacks 77
5.4.3. Chosen Plaintext Attack 83
5.4.4. Chosen Ciphertext Attack 90
5.4.5. Non-Malleable Encryption Schemes 122
5.5. Miscellaneous 126
5.5.1. On Using Encryption Schemes 126
5.5.2. On Information-Theoretic Security 128
5.5.3. On Some Popular Schemes 129
5.5.4. Historical Notes 130
5.5.5. Suggestions for Further Reading 132
5.5.6. Open Problems 133
5.5.7. Exercises 133
6 Digital Signatures and Message Authentication 149
6.1. The Setting and Definitional Issues 150
6.1.1. The Two Types of Schemes: A Brief Overview 150
6.1.2. Introduction to the Unified Treatment 151
6.1.3. Basic Mechanism 153
6.1.4. Attacks and Security 154
6.1.5.* Variants 157
6.2. Length-Restricted Signature Scheme 159
6.2.1. Definition 159
6.2.2. The Power of Length-Restricted Signature Schemes 160
6.2.3.* Constructing Collision-Free Hashing Functions 168
6.3. Constructions of Message-Authentication Schemes 175
6.3.1. Applying a Pseudorandom Function to the Document 175
6.3.2.* More on Hash-and-Hide and State-Based MACs 183
6.4. Constructions of Signature Schemes 189
6.4.1. One-Time Signature Schemes 190
6.4.2. From One-Time Signature Schemes to General Ones 195
6.4.3.* Universal One-Way Hash Functions and Using Them 212
6.5.* Some Additional Properties 227
6.5.1. Unique Signatures 227
6.5.2. Super-Secure Signature Schemes 228
6.5.3. Off-Line/On-Line Signing 232
6.5.4. Incremental Signatures 233
6.5.5. Fail-Stop Signatures 235
6.6. Miscellaneous 236
6.6.1. On Using Signature Schemes 236
6.6.2. On Information-Theoretic Security 237
6.6.3. On Some Popular Schemes 238
6.6.4. Historical Notes 239
6.6.5. Suggestions for Further Reading 241
6.6.6. Open Problems 242
6.6.7. Exercises 242
7 General Cryptographic Protocols 251
7.1. Overview 252
7.1.1. The Definitional Approach and Some Models 253
7.1.2. Some Known Results 259
7.1.3. Construction Paradigms 261
7.2.* The Two-Party Case: Definitions 267
7.2.1. The Syntactic Framework 267
7.2.2. The Semi-Honest Model 271
7.2.3. The Malicious Model 278
7.3.* Privately Computing (Two-Party) Functionalities 286
7.3.1. Privacy Reductions and a Composition Theorem 288
7.3.2. The OTk 1 Protocol: Definition and Construction 292
7.3.3. Privately Computing c1 + c2 = (a1 + a2) · (b1 + b2) 295
7.3.4. The Circuit Evaluation Protocol 297
7.4.* Forcing (Two-Party) Semi-Honest Behavior 302
7.4.1. The Protocol Compiler: Motivation and Overview 302
7.4.2. Security Reductions and a Composition Theorem 304
7.4.3. The Compiler: Functionalities in Use 309
7.4.4. The Compiler Itself 333
7.5.* Extension to the Multi-Party Case 345
7.5.1. Definitions 346
7.5.2. Security in the Semi-Honest Model 353
7.5.3. The Malicious Models: Overview and Preliminaries 360
7.5.4. The First Compiler: Forcing Semi-Honest Behavior 366
7.5.5. The Second Compiler: Effectively Preventing Abort 381
7.6.* Perfect Security in the Private Channel Model 393
7.6.1. Definitions 394
7.6.2. Security in the Semi-Honest Model 395
7.6.3. Security in the Malicious Model 398
7.7. Miscellaneous 399
7.7.1.* Three Deferred Issues 399
7.7.2.* Concurrent Executions 404
7.7.3. Concluding Remarks 407
7.7.4. Historical Notes 408
7.7.5. Suggestions for Further Reading 409
7.7.6. Open Problems 410
7.7.7. Exercises 411
Appendix C: Corrections and Additions to Volume 1 417
C.1. Enhanced Trapdoor Permutations 417
C.2. On Variants of Pseudorandom Functions 420
C.3. On Strong Witness Indistinguishability 420
C.3.1. On Parallel Composition 421
C.3.2. On Theorem 4.6.8 and an Afterthought 422
C.3.3. Consequences 423
C.4. On Non-Interactive Zero-Knowledge 424
C.4.1. On NIZKs with Efficient Prover Strategies 424
C.4.2. On Unbounded NIZKs 425
C.4.3. On Adaptive NIZKs 426
C.5. Some Developments Regarding Zero-Knowledge 427
C.5.1. Composing Zero-Knowledge Protocols 427
C.5.2. Using the Adversary’s Program in the Proof of Security 432
C.6. Additional Corrections and Comments 435
C.7. Additional Mottoes 436
Bibliography 437
Index 447
Title 5
Copyright 6
Dedication 7
Contents II Basic Applications 9
List of Figures 13
Preface 15
Acknowledgments 23
5 Encryption Schemes 25
5.1. The Basic Setting 26
5.1.1. Private-Key Versus Public-Key Schemes 27
5.1.2. The Syntax of Encryption Schemes 28
5.2. Definitions of Security 30
5.2.1. Semantic Security 31
5.2.2. Indistinguishability of Encryptions 34
5.2.3. Equivalence of the Security Definitions 35
5.2.4. Multiple Messages 41
5.2.5.* A Uniform-Complexity Treatment 46
5.3. Constructions of Secure Encryption Schemes 55
5.3.1.* Stream-Ciphers 56
5.3.2. Preliminaries: Block-Ciphers 60
5.3.3. Private-Key Encryption Schemes 62
5.3.4. Public-Key Encryption Schemes 65
5.4.* Beyond Eavesdropping Security 74
5.4.1. Overview 74
5.4.2. Key-Dependent Passive Attacks 77
5.4.3. Chosen Plaintext Attack 83
5.4.4. Chosen Ciphertext Attack 90
5.4.5. Non-Malleable Encryption Schemes 122
5.5. Miscellaneous 126
5.5.1. On Using Encryption Schemes 126
5.5.2. On Information-Theoretic Security 128
5.5.3. On Some Popular Schemes 129
5.5.4. Historical Notes 130
5.5.5. Suggestions for Further Reading 132
5.5.6. Open Problems 133
5.5.7. Exercises 133
6 Digital Signatures and Message Authentication 149
6.1. The Setting and Definitional Issues 150
6.1.1. The Two Types of Schemes: A Brief Overview 150
6.1.2. Introduction to the Unified Treatment 151
6.1.3. Basic Mechanism 153
6.1.4. Attacks and Security 154
6.1.5.* Variants 157
6.2. Length-Restricted Signature Scheme 159
6.2.1. Definition 159
6.2.2. The Power of Length-Restricted Signature Schemes 160
6.2.3.* Constructing Collision-Free Hashing Functions 168
6.3. Constructions of Message-Authentication Schemes 175
6.3.1. Applying a Pseudorandom Function to the Document 175
6.3.2.* More on Hash-and-Hide and State-Based MACs 183
6.4. Constructions of Signature Schemes 189
6.4.1. One-Time Signature Schemes 190
6.4.2. From One-Time Signature Schemes to General Ones 195
6.4.3.* Universal One-Way Hash Functions and Using Them 212
6.5.* Some Additional Properties 227
6.5.1. Unique Signatures 227
6.5.2. Super-Secure Signature Schemes 228
6.5.3. Off-Line/On-Line Signing 232
6.5.4. Incremental Signatures 233
6.5.5. Fail-Stop Signatures 235
6.6. Miscellaneous 236
6.6.1. On Using Signature Schemes 236
6.6.2. On Information-Theoretic Security 237
6.6.3. On Some Popular Schemes 238
6.6.4. Historical Notes 239
6.6.5. Suggestions for Further Reading 241
6.6.6. Open Problems 242
6.6.7. Exercises 242
7 General Cryptographic Protocols 251
7.1. Overview 252
7.1.1. The Definitional Approach and Some Models 253
7.1.2. Some Known Results 259
7.1.3. Construction Paradigms 261
7.2.* The Two-Party Case: Definitions 267
7.2.1. The Syntactic Framework 267
7.2.2. The Semi-Honest Model 271
7.2.3. The Malicious Model 278
7.3.* Privately Computing (Two-Party) Functionalities 286
7.3.1. Privacy Reductions and a Composition Theorem 288
7.3.2. The OTk 1 Protocol: Definition and Construction 292
7.3.3. Privately Computing c1 + c2 = (a1 + a2) · (b1 + b2) 295
7.3.4. The Circuit Evaluation Protocol 297
7.4.* Forcing (Two-Party) Semi-Honest Behavior 302
7.4.1. The Protocol Compiler: Motivation and Overview 302
7.4.2. Security Reductions and a Composition Theorem 304
7.4.3. The Compiler: Functionalities in Use 309
7.4.4. The Compiler Itself 333
7.5.* Extension to the Multi-Party Case 345
7.5.1. Definitions 346
7.5.2. Security in the Semi-Honest Model 353
7.5.3. The Malicious Models: Overview and Preliminaries 360
7.5.4. The First Compiler: Forcing Semi-Honest Behavior 366
7.5.5. The Second Compiler: Effectively Preventing Abort 381
7.6.* Perfect Security in the Private Channel Model 393
7.6.1. Definitions 394
7.6.2. Security in the Semi-Honest Model 395
7.6.3. Security in the Malicious Model 398
7.7. Miscellaneous 399
7.7.1.* Three Deferred Issues 399
7.7.2.* Concurrent Executions 404
7.7.3. Concluding Remarks 407
7.7.4. Historical Notes 408
7.7.5. Suggestions for Further Reading 409
7.7.6. Open Problems 410
7.7.7. Exercises 411
Appendix C: Corrections and Additions to Volume 1 417
C.1. Enhanced Trapdoor Permutations 417
C.2. On Variants of Pseudorandom Functions 420
C.3. On Strong Witness Indistinguishability 420
C.3.1. On Parallel Composition 421
C.3.2. On Theorem 4.6.8 and an Afterthought 422
C.3.3. Consequences 423
C.4. On Non-Interactive Zero-Knowledge 424
C.4.1. On NIZKs with Efficient Prover Strategies 424
C.4.2. On Unbounded NIZKs 425
C.4.3. On Adaptive NIZKs 426
C.5. Some Developments Regarding Zero-Knowledge 427
C.5.1. Composing Zero-Knowledge Protocols 427
C.5.2. Using the Adversary’s Program in the Proof of Security 432
C.6. Additional Corrections and Comments 435
C.7. Additional Mottoes 436
Bibliography 437
Index 447
备用描述
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.
备用描述
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness, and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems rather than on describing ad hoc approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful
备用描述
Annotation Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Also available: Volume I: Basic Tools 0-521-79172-3 Hardback $75.00 C
备用描述
"The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful."--Jacket
备用描述
Up to the 1970s, Cryptography was understood as the art of building encryption schemes, that is, the art of constructing schemes allowing secret data exchange over insecure channels.
开源日期
2020-07-26
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.