Cryptographic Protocols Notes for Lecture 2 Scribe :

نویسندگان

  • Martin Hirt
  • Sandro Coretti
چکیده

Algorithms are commonly formalized as Turing machines, which are the basis for defining notions such as running time and space complexity; the exact formalism, however, is of no concern in this lecture. For our purposes, an algorithm A takes some input x ∈ {0, 1}∗, performs some computation, and outputs a value A(x). Running time and space complexity of an algorithm are measured as a function of the length |x| of its input x. An algorithm is called efficient if its running time is bounded by a polynomial (and thus also its space complexity); an algorithm with an arbitrary running time is called unbounded. An algorithm with access to uniform random bits during its computation is called probabilistic or randomized and deterministic otherwise.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Protocols Notes for Lecture 8 Scribe

A t-out-of-n secret-sharing scheme allows an honest dealer D to distribute a secret s among n players, such that any subset of t players has no information about s, but every set of t + 1 players can collaboratively reconstruct the secret. The most famous secret-sharing scheme is Shamir’s Sharing Scheme [Sha79] (cf. Section 8.1.2). It uses polynomials to obtain the desired properties. Before pr...

متن کامل

How to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols

This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...

متن کامل

Cryptographic Protocols Notes for Lecture 1 Scribe :

A group is a mathematical structure 〈G; ∗〉 consisting of a non-empty set G and a binary operation ∗ : G×G→ G and satisfying the following axioms: (A1) The operation ∗ is associative, i.e., for any x, y, z ∈ G, x ∗ (y ∗ z) = (x ∗ y) ∗ z. (A2) There exists a neutral element e for ∗, i.e., x ∗ e = e ∗ x = x for all x ∈ G. (A3) Every element x ∈ G has an inverse x̂, i.e., x ∗ x̂ = x̂ ∗ x = e. If ∗ is ...

متن کامل

Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings

security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF

متن کامل

CS 49 : Data Stream Algorithms Lecture Notes , Fall 2011 Amit

Acknowledgements These lecture notes began as rough scribe notes for a Fall 2009 offering of the course " Data Stream Algorithms " at Dartmouth College. The initial scribe notes were prepared mostly by students enrolled in the course in 2009. Subsequently, during a Fall 2011 offering of the course, I edited the notes heavily, bringing them into presentable form, with the aim being to create a r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015