Lecture Notes Cryptographic Protocols

نویسنده

  • Berry Schoenmakers
چکیده

ii iii Preface In this course, we focus on asymmetric techniques for cryptographic protocols, also considering proofs of security for various constructions. Motivating example: 'Sinterklaaslootjes trekken' is a Dutch tradition for buying presents and writing little poems, see, The same tradition is also known as " Secret Santa " , and a lot of websites and programs are available to help people doing such drawings over the internet, see, e.g., the " Secret Santa Name Picker " at http://www.tenasoft.com/secretsanta/. The interesting question is how to do this securely?! That is, without trusting the website or program providing this service, but with the guarantee that indeed a random drawing is performed, corresponding to a random permutation without fixed points, and such that each participant learns nothing except who he or she is a Secret Santa for. To be elaborated. Bibliographic notes flagged with a sign in the margin (like this paragraph) still need to checked/extended. Text still to be extended at a few places.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols

This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...

متن کامل

Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings

security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF

متن کامل

Lecture Notes in Computer Science 4887

The problem of learning parity with noise (The LPN problem), which can be re-cast as the problem of decoding a random linear code, has attracted attention recently as a possible tool for developing highly-efficient cryptographic primitives suitable for resource-constrained devices such as RFID tags. This article surveys recent work aimed at designing efficient authentication protocols based on ...

متن کامل

Lecture Notes in Secret Sharing

Preface These are basically the lecture notes for the short course Applications of Combinatorics to 2012. With the objective of covering a full course on secret sharing, additional content will be added in subsequent versions of these lecture notes. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information...

متن کامل

Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study

In Proc. of ESORICS 2005, Milan, Italy, Sept. 12-14, 2005. LNCS. © Springer-Verlag 2005. Abstract. Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008