| 000 | 08379nam a22003498i 4500 | ||
|---|---|---|---|
| 001 | CR9780511546891 | ||
| 003 | UkCbUP | ||
| 005 | 20200124160333.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 090508s2003||||enk o ||1 0|eng|d | ||
| 020 | _a9780511546891 (ebook) | ||
| 020 | _z9780521791724 (hardback) | ||
| 020 | _z9780521035361 (paperback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 0 | 0 |
_aQA268 _b.G5745 2003 |
| 082 | 0 | 0 |
_a652/.8 _221 |
| 100 | 1 |
_aGoldreich, Oded, _eauthor. |
|
| 245 | 1 | 0 |
_aFoundations of cryptography : _bbasic tools / _cOded Goldreich. |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2003. |
|
| 300 |
_a1 online resource (xix, 372 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
| 505 | 0 | 0 |
_g1.1.1. _tEncryption Schemes _g2 -- _g1.1.2. _tPseudorandom Generators _g3 -- _g1.1.3. _tDigital Signatures _g4 -- _g1.1.4. _tFault-Tolerant Protocols and Zero-Knowledge Proofs _g6 -- _g1.2. _tSome Background from Probability Theory _g8 -- _g1.2.1. _tNotational Conventions _g8 -- _g1.2.2. _tThree Inequalities _g9 -- _g1.3. _tComputational Model _g12 -- _g1.3.1. _tP, NP, and NP-Completeness _g12 -- _g1.3.2. _tProbabilistic Polynomial Time _g13 -- _g1.3.3. _tNon-Uniform Polynomial Time _g16 -- _g1.3.4. _tIntractability Assumptions _g19 -- _g1.3.5. _tOracle Machines _g20 -- _g1.4. _tMotivation to the Rigorous Treatment _g21 -- _g1.4.1. _tNeed for a Rigorous Treatment _g21 -- _g1.4.2. _tPractical Consequences of the Rigorous Treatment _g23 -- _g1.4.3. _tTendency to Be Conservative _g24 -- _g1.5.1. _tHistorical Notes _g25 -- _g1.5.3. _tOpen Problems _g27 -- _g2 _tComputational Difficulty _g30 -- _g2.1. _tOne-Way Functions: Motivation _g31 -- _g2.2. _tOne-Way Functions: Definitions _g32 -- _g2.2.1. _tStrong One-Way Functions _g32 -- _g2.2.2. _tWeak One-Way Functions _g35 -- _g2.2.3. _tTwo Useful Length Conventions _g35 -- _g2.2.4. _tCandidates for One-Way Functions _g40 -- _g2.2.5. _tNon-Uniformly One-Way Functions _g41 -- _g2.3. _tWeak One-Way Functions Imply Strong Ones _g43 -- _g2.3.1. _tConstruction and Its Analysis (Proof of Theorem 2.3.2) _g44 -- _g2.3.2. _tIllustration by a Toy Example _g48 -- _g2.4. _tOne-Way Functions: Variations _g51 -- _g2.4.1. _tUniversal One-Way Function _g52 -- _g2.4.2. _tOne-Way Functions as Collections _g53 -- _g2.4.3. _tExamples of One-Way Collections _g55 -- _g2.4.4. _tTrapdoor One-Way Permutations _g58 -- _g2.4.5. _tClaw-Free Functions _g60 -- _g2.4.6. _tOn Proposing Candidates _g63 -- _g2.5. _tHard-Core Predicates _g64 -- _g2.5.2. _tHard-Core Predicates for Any One-Way Function _g65 -- _g2.5.3. _tHard-Core Functions _g74 -- _g2.6. _tEfficient Amplification of One-Way Functions _g78 -- _g2.6.1. _tConstruction _g80 -- _g2.6.2. _tAnalysis _g81 -- _g2.7.1. _tHistorical Notes _g89 -- _g3 _tPseudorandom Generators _g101 -- _g3.1. _tMotivating Discussion _g102 -- _g3.1.1. _tComputational Approaches to Randomness _g102 -- _g3.1.2. _tA Rigorous Approach to Pseudorandom Generators _g103 -- _g3.2. _tComputational Indistinguishability _g103 -- _g3.2.2. _tRelation to Statistical Closeness _g106 -- _g3.2.3. _tIndistinguishability by Repeated Experiments _g107 -- _g3.2.4. _tIndistinguishability by Circuits _g111 -- _g3.2.5. _tPseudorandom Ensembles _g112 -- _g3.3. _tDefinitions of Pseudorandom Generators _g112 -- _g3.3.1. _tStandard Definition of Pseudorandom Generators _g113 -- _g3.3.2. _tIncreasing the Expansion Factor _g114 -- _g3.3.3. _tVariable-Output Pseudorandom Generators _g118 -- _g3.3.4. _tApplicability of Pseudorandom Generators _g119 -- _g3.3.5. _tPseudorandomness and Unpredictability _g119 -- _g3.3.6. _tPseudorandom Generators Imply One-Way Functions _g123 -- _g3.4. _tConstructions Based on One-Way Permutations _g124 -- _g3.4.1. _tConstruction Based on a Single Permutation _g124 -- _g3.4.2. _tConstruction Based on Collections of Permutations _g131 -- _g3.4.3. _tUsing Hard-Core Functions Rather than Predicates _g134 -- _g3.5. _tConstructions Based on One-Way Functions _g135 -- _g3.5.1. _tUsing 1-1 One-Way Functions _g135 -- _g3.5.2. _tUsing Regular One-Way Functions _g141 -- _g3.5.3. _tGoing Beyond Regular One-Way Functions _g147 -- _g3.6. _tPseudorandom Functions _g148 -- _g3.6.3. _tApplications: A General Methodology _g157 -- _g3.7. _tPseudorandom Permutations _g164 -- _g3.8.1. _tHistorical Notes _g169 -- _g4 _tZero-Knowledge Proof Systems _g184 -- _g4.1. _tZero-Knowledge Proofs: Motivation _g185 -- _g4.1.1. _tNotion of a Proof _g187 -- _g4.1.2. _tGaining Knowledge _g189 -- _g4.2. _tInteractive Proof Systems _g190 -- _g4.2.2. _tAn Example (Graph Non-Isomorphism in IP) _g195 -- _g4.2.3. _tStructure of the Class IP _g198 -- _g4.2.4. _tAugmentation of the Model _g199 -- _g4.3. _tZero-Knowledge Proofs: Definitions _g200 -- _g4.3.1. _tPerfect and Computational Zero-Knowledge _g200 -- _g4.3.2. _tAn Example (Graph Isomorphism in PZK) _g207 -- _g4.3.3. _tZero-Knowledge with Respect to Auxiliary Inputs _g213 -- _g4.3.4. _tSequential Composition ofh Zero-Knowledge Proofs _g216 -- _g4.4. _tZero-Knowledge Proofs for NP _g223 -- _g4.4.1. _tCommitment Schemes _g223 -- _g4.4.2. _tZero-Knowledge Proof of Graph Coloring _g228 -- _g4.4.3. _tGeneral Result and Some Applications _g240 -- _g4.4.4. _tSecond-Level Considerations _g243 -- _g4.5. _tNegative Results _g246 -- _g4.5.1. _tOn the Importance of Interaction and Randomness _g247 -- _g4.5.2. _tLimitations of Unconditional Results _g248 -- _g4.5.3. _tLimitations of Statistical ZK Proofs _g250 -- _g4.5.4. _tZero-Knowledge and Parallel Composition _g251 -- _g4.6. _tWitness Indistinguishability and Hiding _g254 -- _g4.6.2. _tParallel Composition _g258 -- _g4.7. _tProofs of Knowledge _g262 -- _g4.7.2. _tReducing the Knowledge Error _g267 -- _g4.7.3. _tZero-Knowledge Proofs of Knowledge for NP _g268 -- _g4.7.5. _tProofs of Identity (Identification Schemes) _g270 -- _g4.7.6. _tStrong Proofs of Knowledge _g274 -- _g4.8. _tComputationally Sound Proofs (Arguments) _g277 -- _g4.8.2. _tPerfectly Hiding Commitment Schemes _g278 -- _g4.8.3. _tPerfect Zero-Knowledge Arguments for NP _g284 -- _g4.8.4. _tArguments of Poly-Logarithmic Efficiency _g286 -- _g4.9. _tConstant-Round Zero-Knowledge Proofs _g288 -- _g4.9.1. _tUsing Commitment Schemes with Perfect Secrecy _g289 -- _g4.9.2. _tBounding the Power of Cheating Provers _g294 -- _g4.10. _tNon-Interactive Zero-Knowledge Proofs _g298 -- _g4.10.3. _tExtensions _g306 -- _g4.11. _tMulti-Prover Zero-Knowledge Proofs _g311 -- _g4.11.2. _tTwo-Sender Commitment Schemes _g313 -- _g4.11.3. _tPerfect Zero-Knowledge for NP _g317 -- _g4.12.1. _tHistorical Notes _g320 -- _gAppendix _tA Background in Computational Number Theory _g331 -- _gA.1. _tPrime Numbers _g331 -- _gA.1.1. _tQuadratic Residues Modulo a Prime _g331 -- _gA.1.2. _tExtracting Square Roots Modulo a Prime _g332 -- _gA.1.3. _tPrimality Testers _g332 -- _gA.1.4. _tOn Uniform Selection of Primes _g333 -- _gA.2. _tComposite Numbers _g334 -- _gA.2.1. _tQuadratic Residues Modulo a Composite _g335 -- _gA.2.2. _tExtracting Square Roots Modulo a Composite _g335 -- _gA.2.3. _tLegendre and Jacobi Symbols _g336 -- _gA.2.4. _tBlum Integers and Their Quadratic-Residue Structure _g337 -- _gAppendix B _tBrief Outline of Volume _g338 -- _gB.1. _tEncryption: Brief Summary _g338 -- _gB.1.3. _tBeyond Eavesdropping Security _g343 -- _gB.2. _tSignatures: Brief Summary _g345 -- _gB.3. _tCryptographic Protocols: Brief Summary _g350. |
| 520 | _aCryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. | ||
| 650 | 0 | _aCoding theory. | |
| 650 | 0 |
_aCryptography _xMathematics. |
|
| 776 | 0 | 8 |
_iPrint version: _z9780521791724 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/CBO9780511546891 |
| 999 |
_c522797 _d522795 |
||