Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Efficient and adaptively secure cryp...
~
Zhou, Hong-Sheng.
Linked to FindBook
Google Book
Amazon
博客來
Efficient and adaptively secure cryptographic primitives---designing for composability.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Efficient and adaptively secure cryptographic primitives---designing for composability./
Author:
Zhou, Hong-Sheng.
Description:
150 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
Contained By:
Dissertation Abstracts International71-09B.
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3420184
ISBN:
9781124157870
Efficient and adaptively secure cryptographic primitives---designing for composability.
Zhou, Hong-Sheng.
Efficient and adaptively secure cryptographic primitives---designing for composability.
- 150 p.
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
Thesis (Ph.D.)--University of Connecticut, 2010.
We study efficient protocol constructions against adaptive corruption in the universal composition framework. For standard cryptographic tasks, we propose a new framework to design efficiently two-party secure function evaluation protocols, and then apply it to oblivious transfer and obtain the first practical such constructions. Regarding reactive cryptographic tasks, we present a framework for designing blind signatures, and construct the first practical protocols for this task.
ISBN: 9781124157870Subjects--Topical Terms:
1669061
Engineering, Computer.
Efficient and adaptively secure cryptographic primitives---designing for composability.
LDR
:01388nam 2200277 4500
001
1399888
005
20110930095900.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124157870
035
$a
(UMI)AAI3420184
035
$a
AAI3420184
040
$a
UMI
$c
UMI
100
1
$a
Zhou, Hong-Sheng.
$3
1678897
245
1 0
$a
Efficient and adaptively secure cryptographic primitives---designing for composability.
300
$a
150 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
500
$a
Adviser: Aggelos Kiayias.
502
$a
Thesis (Ph.D.)--University of Connecticut, 2010.
520
$a
We study efficient protocol constructions against adaptive corruption in the universal composition framework. For standard cryptographic tasks, we propose a new framework to design efficiently two-party secure function evaluation protocols, and then apply it to oblivious transfer and obtain the first practical such constructions. Regarding reactive cryptographic tasks, we present a framework for designing blind signatures, and construct the first practical protocols for this task.
590
$a
School code: 0056.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
University of Connecticut.
$3
1017435
773
0
$t
Dissertation Abstracts International
$g
71-09B.
790
1 0
$a
Kiayias, Aggelos,
$e
advisor
790
$a
0056
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3420184
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9163027
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login