Κεφάλαιο 9Adobe PDF (402.26 kB)
Title Details:
Cryptographic Protocols
Authors: Pagourtzis, Aristeidis
Zachos, Efstathios
Grontas, Panagiotis
Reviewer: Poulakis, Dimitrios
Subject: MATHEMATICS AND COMPUTER SCIENCE > > >
MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY
MATHEMATICS AND COMPUTER SCIENCE >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > >
NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > >
ENGINEERING AND TECHNOLOGY > > >
Description:
Abstract:
Public Key Infrastructure (PKI). Trusted Third Party. Secret key sharing (Shamir, Feldman, Pedersen schemes), threshold cryptosystems. Commitment schemes: Pedersen commitment, chameleon bit commitment. Fair coin tossing. Oblivious Transfer. Challenge-response authentication schemes. Construction methods from cryptosystems (symmetric and public key). Zero-knowledge proof schemes: Fiat-Shamir and Feige-Fiat-Shamir schemes. Secure multi-party computation. Secure broadcast, Byzantine Agreement. Secure Function Evaluation (SFE). Homomorphic encryption.
Type: Chapter
Creation Date: 2015
Item Details:
License: Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
Handle http://hdl.handle.net/11419/5448
Bibliographic Reference: Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Cryptographic Protocols [Chapter]. In Pagourtzis, A., Zachos, E., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5448
Language: Greek
Is Part of: Computational Cryptography
Publication Origin: Kallipos, Open Academic Editions