Text
Foundations of cryptography: basic applications volume II
Foundations of Cryptography II Basic Applications......Page 4
Contents II Basic Applications......Page 8
List of Figures......Page 12
Preface......Page 14
Acknowledgments......Page 22
5 Encryption Schemes......Page 24
5.1. The Basic Setting......Page 25
5.2. De.nitions of Security......Page 29
5.3. Constructions of Secure Encryption Schemes......Page 54
5.4.* Beyond Eavesdropping Security......Page 73
5.5. Miscellaneous......Page 125
6 Digital Signatures and Message Authentication......Page 148
6.1. The Setting and De.nitional Issues......Page 149
6.2. Length-Restricted Signature Scheme......Page 158
6.3. Constructions of Message-Authentication Schemes......Page 174
6.4. Constructions of Signature Schemes......Page 188
6.5.* Some Additional Properties......Page 226
6.6. Miscellaneous......Page 235
7 General Cryptographic Protocols......Page 250
7.1. Overview......Page 251
7.2.* The Two-Party Case: De.nitions......Page 266
7.3.* Privately Computing (Two-Party) Functionalities......Page 285
7.4.* Forcing (Two-Party) Semi-Honest Behavior......Page 301
7.5.* Extension to the Multi-Party Case......Page 344
7.6.* Perfect Security in the Private Channel Model......Page 392
7.7. Miscellaneous......Page 398
C.1. Enhanced Trapdoor Permutations......Page 416
C.3. On Strong Witness Indistinguishability......Page 419
C.4. On Non-Interactive Zero-Knowledge......Page 423
C.5. Some Developments Regarding Zero-Knowledge......Page 426
C.6. Additional Corrections and Comments......Page 434
C.7. Additional Mottoes......Page 435
Bibliography......Page 436
Index......Page 446
No other version available