TY - BOOK AU - Goldreich,Oded TI - Foundations of cryptography: basic tools SN - 9780511546891 (ebook) AV - QA268 .G5745 2003 U1 - 652/.8 21 PY - 2003/// CY - Cambridge PB - Cambridge University Press KW - Coding theory KW - Cryptography KW - Mathematics N1 - Title from publisher's bibliographic system (viewed on 05 Oct 2015); 1.1.1; Encryption Schemes; 2 --; 1.1.2; Pseudorandom Generators; 3 --; 1.1.3; Digital Signatures; 4 --; 1.1.4; Fault-Tolerant Protocols and Zero-Knowledge Proofs; 6 --; 1.2; Some Background from Probability Theory; 8 --; 1.2.1; Notational Conventions; 8 --; 1.2.2; Three Inequalities; 9 --; 1.3; Computational Model; 12 --; 1.3.1; P, NP, and NP-Completeness; 12 --; 1.3.2; Probabilistic Polynomial Time; 13 --; 1.3.3; Non-Uniform Polynomial Time; 16 --; 1.3.4; Intractability Assumptions; 19 --; 1.3.5; Oracle Machines; 20 --; 1.4; Motivation to the Rigorous Treatment; 21 --; 1.4.1; Need for a Rigorous Treatment; 21 --; 1.4.2; Practical Consequences of the Rigorous Treatment; 23 --; 1.4.3; Tendency to Be Conservative; 24 --; 1.5.1; Historical Notes; 25 --; 1.5.3; Open Problems; 27 --; 2; Computational Difficulty; 30 --; 2.1; One-Way Functions: Motivation; 31 --; 2.2; One-Way Functions: Definitions; 32 --; 2.2.1; Strong One-Way Functions; 32 --; 2.2.2; Weak One-Way Functions; 35 --; 2.2.3; Two Useful Length Conventions; 35 --; 2.2.4; Candidates for One-Way Functions; 40 --; 2.2.5; Non-Uniformly One-Way Functions; 41 --; 2.3; Weak One-Way Functions Imply Strong Ones; 43 --; 2.3.1; Construction and Its Analysis (Proof of Theorem 2.3.2); 44 --; 2.3.2; Illustration by a Toy Example; 48 --; 2.4; One-Way Functions: Variations; 51 --; 2.4.1; Universal One-Way Function; 52 --; 2.4.2; One-Way Functions as Collections; 53 --; 2.4.3; Examples of One-Way Collections; 55 --; 2.4.4; Trapdoor One-Way Permutations; 58 --; 2.4.5; Claw-Free Functions; 60 --; 2.4.6; On Proposing Candidates; 63 --; 2.5; Hard-Core Predicates; 64 --; 2.5.2; Hard-Core Predicates for Any One-Way Function; 65 --; 2.5.3; Hard-Core Functions; 74 --; 2.6; Efficient Amplification of One-Way Functions; 78 --; 2.6.1; Construction; 80 --; 2.6.2; Analysis; 81 --; 2.7.1; Historical Notes; 89 --; 3; Pseudorandom Generators; 101 --; 3.1; Motivating Discussion; 102 --; 3.1.1; Computational Approaches to Randomness; 102 --; 3.1.2; A Rigorous Approach to Pseudorandom Generators; 103 --; 3.2; Computational Indistinguishability; 103 --; 3.2.2; Relation to Statistical Closeness; 106 --; 3.2.3; Indistinguishability by Repeated Experiments; 107 --; 3.2.4; Indistinguishability by Circuits; 111 --; 3.2.5; Pseudorandom Ensembles; 112 --; 3.3; Definitions of Pseudorandom Generators; 112 --; 3.3.1; Standard Definition of Pseudorandom Generators; 113 --; 3.3.2; Increasing the Expansion Factor; 114 --; 3.3.3; Variable-Output Pseudorandom Generators; 118 --; 3.3.4; Applicability of Pseudorandom Generators; 119 --; 3.3.5; Pseudorandomness and Unpredictability; 119 --; 3.3.6; Pseudorandom Generators Imply One-Way Functions; 123 --; 3.4; Constructions Based on One-Way Permutations; 124 --; 3.4.1; Construction Based on a Single Permutation; 124 --; 3.4.2; Construction Based on Collections of Permutations; 131 --; 3.4.3; Using Hard-Core Functions Rather than Predicates; 134 --; 3.5; Constructions Based on One-Way Functions; 135 --; 3.5.1; Using 1-1 One-Way Functions; 135 --; 3.5.2; Using Regular One-Way Functions; 141 --; 3.5.3; Going Beyond Regular One-Way Functions; 147 --; 3.6; Pseudorandom Functions; 148 --; 3.6.3; Applications: A General Methodology; 157 --; 3.7; Pseudorandom Permutations; 164 --; 3.8.1; Historical Notes; 169 --; 4; Zero-Knowledge Proof Systems; 184 --; 4.1; Zero-Knowledge Proofs: Motivation; 185 --; 4.1.1; Notion of a Proof; 187 --; 4.1.2; Gaining Knowledge; 189 --; 4.2; Interactive Proof Systems; 190 --; 4.2.2; An Example (Graph Non-Isomorphism in IP); 195 --; 4.2.3; Structure of the Class IP; 198 --; 4.2.4; Augmentation of the Model; 199 --; 4.3; Zero-Knowledge Proofs: Definitions; 200 --; 4.3.1; Perfect and Computational Zero-Knowledge; 200 --; 4.3.2; An Example (Graph Isomorphism in PZK); 207 --; 4.3.3; Zero-Knowledge with Respect to Auxiliary Inputs; 213 --; 4.3.4; Sequential Composition ofh Zero-Knowledge Proofs; 216 --; 4.4; Zero-Knowledge Proofs for NP; 223 --; 4.4.1; Commitment Schemes; 223 --; 4.4.2; Zero-Knowledge Proof of Graph Coloring; 228 --; 4.4.3; General Result and Some Applications; 240 --; 4.4.4; Second-Level Considerations; 243 --; 4.5; Negative Results; 246 --; 4.5.1; On the Importance of Interaction and Randomness; 247 --; 4.5.2; Limitations of Unconditional Results; 248 --; 4.5.3; Limitations of Statistical ZK Proofs; 250 --; 4.5.4; Zero-Knowledge and Parallel Composition; 251 --; 4.6; Witness Indistinguishability and Hiding; 254 --; 4.6.2; Parallel Composition; 258 --; 4.7; Proofs of Knowledge; 262 --; 4.7.2; Reducing the Knowledge Error; 267 --; 4.7.3; Zero-Knowledge Proofs of Knowledge for NP; 268 --; 4.7.5; Proofs of Identity (Identification Schemes); 270 --; 4.7.6; Strong Proofs of Knowledge; 274 --; 4.8; Computationally Sound Proofs (Arguments); 277 --; 4.8.2; Perfectly Hiding Commitment Schemes; 278 --; 4.8.3; Perfect Zero-Knowledge Arguments for NP; 284 --; 4.8.4; Arguments of Poly-Logarithmic Efficiency; 286 --; 4.9; Constant-Round Zero-Knowledge Proofs; 288 --; 4.9.1; Using Commitment Schemes with Perfect Secrecy; 289 --; 4.9.2; Bounding the Power of Cheating Provers; 294 --; 4.10; Non-Interactive Zero-Knowledge Proofs; 298 --; 4.10.3; Extensions; 306 --; 4.11; Multi-Prover Zero-Knowledge Proofs; 311 --; 4.11.2; Two-Sender Commitment Schemes; 313 --; 4.11.3; Perfect Zero-Knowledge for NP; 317 --; 4.12.1; Historical Notes; 320 --; Appendix; A Background in Computational Number Theory; 331 --; A.1; Prime Numbers; 331 --; A.1.1; Quadratic Residues Modulo a Prime; 331 --; A.1.2; Extracting Square Roots Modulo a Prime; 332 --; A.1.3; Primality Testers; 332 --; A.1.4; On Uniform Selection of Primes; 333 --; A.2; Composite Numbers; 334 --; A.2.1; Quadratic Residues Modulo a Composite; 335 --; A.2.2; Extracting Square Roots Modulo a Composite; 335 --; A.2.3; Legendre and Jacobi Symbols; 336 --; A.2.4; Blum Integers and Their Quadratic-Residue Structure; 337 --; Appendix B; Brief Outline of Volume; 338 --; B.1; Encryption: Brief Summary; 338 --; B.1.3; Beyond Eavesdropping Security; 343 --; B.2; Signatures: Brief Summary; 345 --; B.3; Cryptographic Protocols: Brief Summary; 350 N2 - Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful UR - https://doi.org/10.1017/CBO9780511546891 ER -