skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Introduction to security reduction Preview this item
ClosePreview this item
Checking...

Introduction to security reduction

Author: Fuchun Guo; Willy Susilo; Yi Mu
Publisher: Cham, Switzerland : Springer, [2018]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
(OCoLC)1034576886
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Fuchun Guo; Willy Susilo; Yi Mu
ISBN: 9783319930497 3319930494
OCLC Number: 1043446407
Description: 1 online resource
Contents: Intro; Preface; Acknowledgements; Contents; Chapter 1 Guide to This Book; Chapter 2 Notions, Definitions, and Models; 2.1 Digital Signatures; 2.2 Public-Key Encryption; 2.3 Identity-Based Encryption; 2.4 Further Reading; Chapter 3 Foundations of Group-Based Cryptography; 3.1 Finite Fields; 3.1.1 Definition; 3.1.2 Field Operations; 3.1.3 Field Choices; 3.1.4 Computations over a Prime Field; 3.2 Cyclic Groups; 3.2.1 Definitions; 3.2.2 Cyclic Groups of Prime Order; 3.2.3 Group Exponentiations; 3.2.4 Discrete Logarithms; 3.2.5 Cyclic Groups from Finite Fields. 3.2.6 Group Choice 1: Multiplicative Groups3.2.7 Group Choice 2: Elliptic Curve Groups; 3.2.8 Computations over a Group; 3.3 Bilinear Pairings; 3.3.1 Symmetric Pairing; 3.3.2 Asymmetric Pairing; 3.3.3 Computations over a Pairing Group; 3.4 Hash Functions; 3.5 Further Reading; Chapter 4 Foundations of Security Reduction; 4.1 Introduction to Basic Concepts; 4.1.1 Mathematical Primitives and Superstructures; 4.1.2 Mathematical Problems and Problem Instances; 4.1.3 Cryptography, Cryptosystems, and Schemes; 4.1.4 Algorithm Classification 1; 4.1.5 Polynomial Time and Exponential Time. 4.1.6 Negligible and Non-negligible4.1.7 Insecure and Secure; 4.1.8 Easy and Hard; 4.1.9 Algorithm Classification 2; 4.1.10 Algorithms in Cryptography; 4.1.11 Hard Problems in Cryptography; 4.1.12 Security Levels; 4.1.13 Hard Problems and Hardness Assumptions; 4.1.14 Security Reductions and Security Proofs; 4.2 An Overview of Easy/Hard Problems; 4.2.1 Computational Easy Problems; 4.2.2 Computational Hard Problems; 4.2.3 Decisional Easy Problems; 4.2.4 Decisional Hard Problems; 4.2.5 How to Prove New Hard Problems; 4.2.6 Weak Assumptions and Strong Assumptions. 4.3 An Overview of Security Reduction4.3.1 Security Models; 4.3.2 Weak Security Models and Strong Security Models; 4.3.3 Proof by Testing; 4.3.4 Proof by Contradiction; 4.3.5 What Is Security Reduction?; 4.3.6 Real Scheme and Simulated Scheme; 4.3.7 Challenger and Simulator; 4.3.8 Real Attack and Simulation; 4.3.9 Attacks and Hard Problems; 4.3.10 Reduction Cost and Reduction Loss; 4.3.11 Loose Reduction and Tight Reduction; 4.3.12 Security Level Revisited; 4.3.13 Ideal Security Reduction; 4.4 An Overview of Correct Security Reduction; 4.4.1 What Should Bob Do? 4.4.2 Understanding Security Reduction4.4.3 Successful Simulation and Indistinguishable Simulation; 4.4.4 Failed Attack and Successful Attack; 4.4.5 Useless Attack and Useful Attack; 4.4.6 Attack in Simulation; 4.4.7 Successful/Correct Security Reduction; 4.4.8 Components of a Security Proof; 4.5 An Overview of the Adversary; 4.5.1 Black-Box Adversary; 4.5.2 What Is an Adaptive Attack?; 4.5.3 Malicious Adversary; 4.5.4 The Adversary in a Toy Game; 4.5.5 Adversary's Successful Attack and Its Probability; 4.5.6 Adversary's Computational Ability.
Responsibility: Fuchun Guo, Willy Susilo, Yi Mu.

Abstract:

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1043446407<\/a>> # Introduction to security reduction<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1043446407<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Place\/cham_switzerland<\/a>> ; # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/data_encryption_computer_science<\/a>> ; # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/computers_security_cryptography<\/a>> ; # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/susilo_willy<\/a>> ; # Willy Susilo<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/mu_yi<\/a>> ; # Yi Mu<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/guo_fuchun<\/a>> ; # Fuchun Guo<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Intro; Preface; Acknowledgements; Contents; Chapter 1 Guide to This Book; Chapter 2 Notions, Definitions, and Models; 2.1 Digital Signatures; 2.2 Public-Key Encryption; 2.3 Identity-Based Encryption; 2.4 Further Reading; Chapter 3 Foundations of Group-Based Cryptography; 3.1 Finite Fields; 3.1.1 Definition; 3.1.2 Field Operations; 3.1.3 Field Choices; 3.1.4 Computations over a Prime Field; 3.2 Cyclic Groups; 3.2.1 Definitions; 3.2.2 Cyclic Groups of Prime Order; 3.2.3 Group Exponentiations; 3.2.4 Discrete Logarithms; 3.2.5 Cyclic Groups from Finite Fields.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5353253649<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1034576886<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Introduction to security reduction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1043446407<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1043446407#PublicationEvent\/cham_switzerland_springer_2018<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-319-93049-7<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5438626<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9783319930497<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1840166<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/book\/10.1007%2F978-3-319-93049-7<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319930497<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-319-93049-7<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1043446407<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1007\/978-3-319-93049-7<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Agent\/springer<\/a>> # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/guo_fuchun<\/a>> # Fuchun Guo<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Guo<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Fuchun<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Fuchun Guo<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/mu_yi<\/a>> # Yi Mu<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Mu<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Yi<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Yi Mu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Person\/susilo_willy<\/a>> # Willy Susilo<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Susilo<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Willy<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Willy Susilo<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Place\/cham_switzerland<\/a>> # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cham, Switzerland<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/computers_security_cryptography<\/a>> # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Topic\/data_encryption_computer_science<\/a>> # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data encryption (Computer science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"sz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319930497<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319930494<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319930497<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/1034576886<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1043446407<\/a>> ; # Introduction to security reduction<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1043446407<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1043446407<\/a>> ; # Introduction to security reduction<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-04-01<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1043446407#PublicationEvent\/cham_switzerland_springer_2018<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Place\/cham_switzerland<\/a>> ; # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5353253649#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n