Information Theoretic Security
Springer Berlin (Verlag)
978-3-642-10229-5 (ISBN)
Authentication I.- Commitment and Authentication Systems.- Unconditionally Secure Blind Signatures.- Keynote Lecture.- Random Systems: Theory and Applications.- Group Cryptography.- Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation.- Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement.- Improvement of Collusion Secure Convolutional Fingerprinting Information Codes.- Private and Reliable Message Transmission.- On Exponential Lower Bound for Protocols for Reliable Communication in Networks.- Almost Secure (1-Round, n-Channel) Message Transmission Scheme.- Invited Talk.- Construction Methodology of Unconditionally Secure Signature Schemes.- Authentication II.- New Results on Unconditionally Secure Multi-receiver Manual Authentication.- Unconditionally Secure Chaffing-and-Winnowing for Multiple Use.- Invited Talk.- to Quantum Information Theory.- Secret Sharing.- Strongly Multiplicative Hierarchical Threshold Secret Sharing.- Secret Sharing Comparison by Transformation and Rotation.- Invited Talk.- Anonymous Quantum Communication.- Applications of Information Theory.- Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.- Cryptographic Security of Individual Instances.
Erscheint lt. Verlag | 2.11.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 211 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 349 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • broadcast encryption • Commitment • Communication Efficiency • cryptographic protocols • cryptography • Efficiency • encryption schemes • Fingerprinting • Hardcover, Softcover / Informatik, EDV/Informatik • Information Hiding • Information Theory • key distribution • Kolmogorov complexity • multi-party com • Multi-Party Computation • Network Security • oblivious transfer • pairings • perfect reliable • perfect secrecy • Quantum Cryptography • Quantum key distribution • Secret Sharing • security • signature schemes • symmetric keys • Systems Security • traitor tracing • unconditional security • Zero-knowledge |
ISBN-10 | 3-642-10229-8 / 3642102298 |
ISBN-13 | 978-3-642-10229-5 / 9783642102295 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich