## Foundations of Cryptography: Volume 2, Basic Applications, Volume 2Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Also available: Volume I: Basic Tools 0-521-79172-3 Hardback $75.00 C |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Common terms and phrases

abort answer authentication auxiliary input Bmal chosen ciphertext attacks chosen plaintext attacks collision-free hashing commitment scheme computationally indistinguishable consider Construction corresponding Cryptography decryption defined Definition denoted deterministic emulation encryption-key ensembles execution Exercise exists follows Furthermore given hashing functions holds honest parties i-th ideal model implementation input 1n invokes key-generation l-restricted length length-restricted machine malicious model multi-party non-uniform Oblivious Transfer obtain ofEq one-time pad one-time signature scheme one-way functions oracle machine oracle-aided protocol output pair party’s polynomial polynomial-size circuits pre-image private-key encryption scheme privately computing probabilistic polynomial-time algorithm probability proof of Proposition pseudorandom function public-key encryption scheme query random random-tape real-model adversary Recall reference string resp scheme G Section securely computes semantic security semi-honest model sequence signing-key simulator Specifically Step C2 stress Theorem tion trapdoor permutations trusted party two-party uniformly distributed uniformly selects UOWHF verification-key verifier zero-knowledge