Title Details: | |
Cryptographic Protocols |
|
Authors: |
Pagourtzis, Aristeidis Zachos, Efstathios Grontas, Panagiotis |
Reviewer: |
Poulakis, Dimitrios |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > > > MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > > NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > > ENGINEERING AND TECHNOLOGY > > > |
Description: | |
Abstract: |
Public Key Infrastructure (PKI). Trusted Third Party. Secret key sharing (Shamir, Feldman, Pedersen schemes), threshold cryptosystems. Commitment schemes: Pedersen commitment, chameleon bit commitment. Fair coin tossing. Oblivious Transfer. Challenge-response authentication schemes. Construction methods from cryptosystems (symmetric and public key). Zero-knowledge proof schemes: Fiat-Shamir and Feige-Fiat-Shamir schemes. Secure multi-party computation. Secure broadcast, Byzantine Agreement. Secure Function Evaluation (SFE). Homomorphic encryption.
|
Type: |
Chapter |
Creation Date: | 2015 |
Item Details: | |
License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
Handle | http://hdl.handle.net/11419/5448 |
Bibliographic Reference: | Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Cryptographic Protocols [Chapter]. In Pagourtzis, A., Zachos, E., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5448 |
Language: |
Greek |
Is Part of: |
Computational Cryptography |
Publication Origin: |
Kallipos, Open Academic Editions |