000843854 000__ 05102cam\a2200541I\\4500 000843854 001__ 843854 000843854 005__ 20230306144817.0 000843854 006__ m\\\\\o\\d\\\\\\\\ 000843854 007__ cr\|n\nnnunnun 000843854 008__ 180707s2018\\\\sz\\\\\\ob\\\\000\0\eng\d 000843854 019__ $$a1043656331 000843854 020__ $$a9783319930497$$q(electronic book) 000843854 020__ $$a3319930494$$q(electronic book) 000843854 020__ $$z9783319930480 000843854 020__ $$z3319930486 000843854 035__ $$aSP(OCoLC)on1043446407 000843854 035__ $$aSP(OCoLC)1043446407$$z(OCoLC)1043656331 000843854 040__ $$aYDX$$beng$$cYDX$$dN$T$$dEBLCP$$dGW5XE$$dUAB 000843854 049__ $$aISEA 000843854 050_4 $$aQA76.9.A25 000843854 08204 $$a005.8$$223 000843854 1001_ $$aGuo, Fuchun,$$eauthor. 000843854 24510 $$aIntroduction to security reduction /$$cFuchun Guo, Willy Susilo, Yi Mu. 000843854 260__ $$aCham, Switzerland :$$bSpringer,$$c[2018] 000843854 300__ $$a1 online resource. 000843854 336__ $$atext$$btxt$$2rdacontent 000843854 337__ $$acomputer$$bc$$2rdamedia 000843854 338__ $$aonline resource$$bcr$$2rdacarrier 000843854 504__ $$aIncludes bibliographical references. 000843854 5050_ $$aIntro; Preface; Acknowledgements; Contents; Chapter 1 Guide to This Book; Chapter 2 Notions, Definitions, and Models; 2.1 Digital Signatures; 2.2 Public-Key Encryption; 2.3 Identity-Based Encryption; 2.4 Further Reading; Chapter 3 Foundations of Group-Based Cryptography; 3.1 Finite Fields; 3.1.1 Definition; 3.1.2 Field Operations; 3.1.3 Field Choices; 3.1.4 Computations over a Prime Field; 3.2 Cyclic Groups; 3.2.1 Definitions; 3.2.2 Cyclic Groups of Prime Order; 3.2.3 Group Exponentiations; 3.2.4 Discrete Logarithms; 3.2.5 Cyclic Groups from Finite Fields 000843854 5058_ $$a3.2.6 Group Choice 1: Multiplicative Groups3.2.7 Group Choice 2: Elliptic Curve Groups; 3.2.8 Computations over a Group; 3.3 Bilinear Pairings; 3.3.1 Symmetric Pairing; 3.3.2 Asymmetric Pairing; 3.3.3 Computations over a Pairing Group; 3.4 Hash Functions; 3.5 Further Reading; Chapter 4 Foundations of Security Reduction; 4.1 Introduction to Basic Concepts; 4.1.1 Mathematical Primitives and Superstructures; 4.1.2 Mathematical Problems and Problem Instances; 4.1.3 Cryptography, Cryptosystems, and Schemes; 4.1.4 Algorithm Classification 1; 4.1.5 Polynomial Time and Exponential Time 000843854 5058_ $$a4.1.6 Negligible and Non-negligible4.1.7 Insecure and Secure; 4.1.8 Easy and Hard; 4.1.9 Algorithm Classification 2; 4.1.10 Algorithms in Cryptography; 4.1.11 Hard Problems in Cryptography; 4.1.12 Security Levels; 4.1.13 Hard Problems and Hardness Assumptions; 4.1.14 Security Reductions and Security Proofs; 4.2 An Overview of Easy/Hard Problems; 4.2.1 Computational Easy Problems; 4.2.2 Computational Hard Problems; 4.2.3 Decisional Easy Problems; 4.2.4 Decisional Hard Problems; 4.2.5 How to Prove New Hard Problems; 4.2.6 Weak Assumptions and Strong Assumptions 000843854 5058_ $$a4.3 An Overview of Security Reduction4.3.1 Security Models; 4.3.2 Weak Security Models and Strong Security Models; 4.3.3 Proof by Testing; 4.3.4 Proof by Contradiction; 4.3.5 What Is Security Reduction?; 4.3.6 Real Scheme and Simulated Scheme; 4.3.7 Challenger and Simulator; 4.3.8 Real Attack and Simulation; 4.3.9 Attacks and Hard Problems; 4.3.10 Reduction Cost and Reduction Loss; 4.3.11 Loose Reduction and Tight Reduction; 4.3.12 Security Level Revisited; 4.3.13 Ideal Security Reduction; 4.4 An Overview of Correct Security Reduction; 4.4.1 What Should Bob Do? 000843854 5058_ $$a4.4.2 Understanding Security Reduction4.4.3 Successful Simulation and Indistinguishable Simulation; 4.4.4 Failed Attack and Successful Attack; 4.4.5 Useless Attack and Useful Attack; 4.4.6 Attack in Simulation; 4.4.7 Successful/Correct Security Reduction; 4.4.8 Components of a Security Proof; 4.5 An Overview of the Adversary; 4.5.1 Black-Box Adversary; 4.5.2 What Is an Adaptive Attack?; 4.5.3 Malicious Adversary; 4.5.4 The Adversary in a Toy Game; 4.5.5 Adversary's Successful Attack and Its Probability; 4.5.6 Adversary's Computational Ability 000843854 506__ $$aAccess limited to authorized users. 000843854 520__ $$aThis monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography. 000843854 588__ $$aOnline resource; title from PDF title page (viewed July 10, 2018). 000843854 650_0 $$aData encryption (Computer science) 000843854 650_0 $$aComputer security. 000843854 650_0 $$aCryptography. 000843854 7001_ $$aSusilo, Willy,$$eauthor. 000843854 7001_ $$aMu, Yi,$$eauthor. 000843854 77608 $$iPrint version:$$z3319930486$$z9783319930480$$w(OCoLC)1034576886 000843854 852__ $$bebk 000843854 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-93049-7$$zOnline Access$$91397441.1 000843854 909CO $$ooai:library.usi.edu:843854$$pGLOBAL_SET 000843854 980__ $$aEBOOK 000843854 980__ $$aBIB 000843854 982__ $$aEbook 000843854 983__ $$aOnline 000843854 994__ $$a92$$bISE