Lecture Notes Cryptographic Protocols
نویسنده
چکیده
ii iii Preface In this course, we focus on asymmetric techniques for cryptographic protocols, also considering proofs of security for various constructions. Motivating example: 'Sinterklaaslootjes trekken' is a Dutch tradition for buying presents and writing little poems, see, The same tradition is also known as " Secret Santa " , and a lot of websites and programs are available to help people doing such drawings over the internet, see, e.g., the " Secret Santa Name Picker " at http://www.tenasoft.com/secretsanta/. The interesting question is how to do this securely?! That is, without trusting the website or program providing this service, but with the guarantee that indeed a random drawing is performed, corresponding to a random permutation without fixed points, and such that each participant learns nothing except who he or she is a Secret Santa for. To be elaborated. Bibliographic notes flagged with a sign in the margin (like this paragraph) still need to checked/extended. Text still to be extended at a few places.
منابع مشابه
How to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols
This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...
متن کاملCryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings
security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF
متن کاملLecture Notes in Computer Science 4887
The problem of learning parity with noise (The LPN problem), which can be re-cast as the problem of decoding a random linear code, has attracted attention recently as a possible tool for developing highly-efficient cryptographic primitives suitable for resource-constrained devices such as RFID tags. This article surveys recent work aimed at designing efficient authentication protocols based on ...
متن کاملLecture Notes in Secret Sharing
Preface These are basically the lecture notes for the short course Applications of Combinatorics to 2012. With the objective of covering a full course on secret sharing, additional content will be added in subsequent versions of these lecture notes. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information...
متن کاملSecurity-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
In Proc. of ESORICS 2005, Milan, Italy, Sept. 12-14, 2005. LNCS. © Springer-Verlag 2005. Abstract. Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance...
متن کامل