My Account Log in

1 option

Information-theoretic cryptography / Himanshu Tyagi, Shun Watanabe.

Cambridge eBooks: 2023 Frontlist Available online

View online
Format:
Book
Author/Creator:
Tyagi, Himanshu, author.
Watanabe, Shun, author.
Language:
English
Subjects (All):
Cryptography.
Physical Description:
1 online resource (xiv, 504 pages) : illustrations (black and white), digital, PDF file(s)
Edition:
First edition.
Place of Publication:
Cambridge : Cambridge University Press, 2023.
Summary:
This introductory graduate coursebook offers a mathematical foundation for modern cryptography. Coverage includes secret key agreement, authentication, secret sharing, and secure computation. The book will also serve experts in the field as a reference for information-theoretic tools such as smooth min/max entropies and information spectrum.
Contents:
Cover
Halftitle page
Title page
Copyright page
Dedication
Contents
Preface
1 Introduction
1.1 Information Theory and Cryptography
1.2 Overview of Covered Topics
1.3 Overview of the Technical Framework
1.3.1 A Resource Theory for Cryptography
1.3.2 Formal Security Definitions
1.4 Possible Course Plans
1.5 References and Additional Reading
Part I External Adversary: Encryption, Authentication, Secret Key
2 Basic Information Theory
2.1 Very Basic Probability
2.2 The Law of Large Numbers
2.3 Convex and Concave Functions
2.4 Total Variation Distance
2.5 Kullback-Leibler Divergence
2.6 Shannon Entropy
2.7 Mutual Information
2.8 Fano's Inequality
2.9 Maximal Coupling Lemma
2.10 A Variational Formula for KL Divergence
2.11 Continuity of Entropy
2.12 Hoeffding's Inequality
2.13 Pinsker's Inequality
2.14 Rényi Entropy
2.15 References and Additional Reading
Problems
3 Secret Keys and Encryption
3.1 Secure Communication
3.2 Approximate Security
3.2.1 Indistinguishable and Semantic Security
3.2.2 Mutual Information and Total Variation Security
3.2.3 Impossibility Theorem for Approximate Security
3.3 Approximately Secure Keys
3.3.1 One-time Pad Using an Approximately Secure Key
3.3.2 Composable Security
3.4 Security and Reliability
3.5 References and Additional Reading
4 Universal Hash Families
4.1 A Short Primer on Finite Fields
4.2 Universal Hash Family: Basic Definition
4.3 Strong Universal Hash Families
4.4 Example Applications
4.4.1 Compression
4.4.2 Random Number Generation
4.4.3 Authentication
4.5 Almost Universal Hash Families
4.6 Practical Constructions
4.6.1 The Poly1305 Hash
4.6.2 The Nonlinear Hash (NH)
4.6.3 Reducing Randomness Cost.
4.7 References and Additional Reading
5 Hypothesis Testing
5.1 Binary Hypothesis Testing: The Neyman-Pearson Formulation
5.2 The Neyman-Pearson Lemma
5.3 Divergence and Hypothesis Testing
5.4 Stein's Lemma
5.5 A Primer on Method of Types
5.6 Composite Hypothesis Testing
5.7 References and Additional Reading
6 Information Reconciliation
6.1 Source Coding and Smooth Max-entropy
6.2 Source Coding with Side-information and Conditional Smooth Max-entropy
6.3 Evaluation of Smooth Max-entropies
6.4 References and Additional Reading
7 Random Number Generation
7.1 Random Number Generation
7.2 Leftover Hashing
7.3 Leftover Hashing with Side-information
7.4 Smoothing
7.5 A General Leftover Hash Lemma
7.6 Evaluation of Smooth Min-entropies
7.7 References and Additional Reading
8 Authentication
8.1 Message Authentication Using Secret Keys
8.2 MAC with Optimal Attack Detection Probabilities
8.3 MAC with Optimal Length Secret Keys
8.4 Authentication of Multiple Messages
8.5 Nonmalleability
8.6 References and Additional Reading
9 Computationally Secure Encryption and Authentication
9.1 One-time Encryption Revisited
9.2 Pseudorandom Generators and Computational Security
9.3 CPA Secure Encryption and Pseudorandom Functions
9.4 CCA Secure Encryption and Authentication
9.5 References and Additional Reading
10 Secret Key Agreement
10.1 Information-theoretic Secret Key Agreement
10.2 Information Reconciliation and Privacy Amplification
10.3 Impossibility Bounds
10.3.1 A Basic Impossibility Bound
10.3.2 Conditional Independence Testing Bound
10.3.3 Bounds Using Monotones
10.4 Secret Key Capacity
10.5 Protocols with Interactive Communication.
10.6 References and Additional Reading
Part II Internal Adversary: Secure Computation
11 Secret Sharing
11.1 Threshold Schemes
11.2 Ramp Schemes
11.3 Secret Sharing Schemes with a General Access Structure
11.4 Dishonest Share Holders
11.5 Error Correction and Secret Sharing
11.6 References and Additional Reading
12 Two-party Secure Computation for a Passive Adversary
12.1 Secure Computation with Interactive Communication
12.2 Secure Computation of Asymmetric Functions and Randomized Functions
12.3 Perfect Secure Computation from Scratch
12.4 Oblivious Transfer
12.5 Oracle Access and Memoryless Channels
12.6 Completeness of Oblivious Transfer
12.7 Classification of Deterministic Symmetric Functions
12.8 References and Additional Reading
13 Oblivious Transfer from Correlated Randomness
13.1 Information-theoretic Construction of Oblivious Transfer
13.2 String Oblivious Transfer from Correlation
13.3 Construction of Oblivious Transfer from Correlation
13.3.1 Erasure Correlation
13.3.2 Generalized Erasure Correlation
13.3.3 Correlation with Degenerate Reverse Channel
13.3.4 The Alphabet Extension Technique
13.4 Impossibility Results
13.4.1 Bound Based on Correlation
13.4.2 Bound Based on Uncertainty
13.5 Oblivious Transfer Capacity
13.6 Proof of Characterization of Complete Functions
13.6.1 The Construction of a Secure Computing Protocol
13.6.2 Impossibility Results on OT Generation
13.7 References and Additional Reading
14 Bit Commitment from Correlated Randomness
14.1 Bit Commitment
14.2 Example Applications
14.2.1 Coin Flipping
14.2.2 Zero-knowledge Proof
14.3 Standalone Security of Implemented Bit Commitment
14.4 Schemes for Implementing Bit Commitment Protocols.
14.4.1 Bit Commitment from Oblivious Transfer
14.4.2 Adversarial Correlation Test
14.4.3 Bit Commitment from General Correlation
14.5 Impossibility Result
14.6 Bit Commitment Capacity
14.7 References and Additional Reading
15 Active Adversary and Composable Security
15.1 Functions and Protocols
15.2 Admissible and Nonadmissible Attacks
15.3 Perfect Standalone Security
15.4 Approximate Standalone Security and Protocols with Abort
15.5 Composable Security and the Sequential Composition Theorem
15.6 Security for Multiphase Functions
15.7 Complete Fairness and Relaxation
15.8 Concurrent Composition
15.9 Oblivious Transfer from Correlated Randomness: Active Adversary
15.10 References and Additional Reading
16 Zero-knowledge Proof
16.1 Interactive Proofs and Zero-knowledge Proofs
16.2 Zero-knowledge Proof for an NP Language
16.3 Multi-prover Interactive Proofs
16.4 Parallel Repetition
16.5 References and Additional Reading
17 Two-party Secure Computation for an Active Adversary
17.1 The AND Function
17.2 The Committed Copy Function
17.3 Proving Linear Relations
17.4 The Committed Oblivious Transfer Function
17.5 Security Analysis of the Protocol for AND
17.6 References and Additional Reading
18 Broadcast, Byzantine Agreement, and Digital Signature
18.1 Multiparty Communication Model
18.2 Broadcast and Byzantine Agreement
18.3 Broadcast from Scratch
18.4 Impossibility of Broadcast from Scratch without a Supermajority
18.5 Broadcast without a Supermajority
18.5.1 Digital Signature
18.5.2 Broadcast and Digital Signature
18.6 Computationally Secure Digital Signature
18.7 References and Additional Reading
19 Multiparty Secure Computation
19.1 Multiparty Computation Formulation.
19.2 Secure Computation from Scratch for a Passive Adversary
19.3 Verifiable Secret Sharing
19.3.1 Dishonest Dealer
19.3.2 Scheme for an Honest Supermajority
19.4 Secure Computation for an Active Adversary
19.4.1 Commitment Using Verifiable Secret Sharing
19.4.2 Committed Addition
19.4.3 Committed Multiplication
19.5 Beyond an Honest Majority
19.5.1 Securely Computable Functions from Scratch
19.5.2 Secure Computation Using OT
19.6 References and Additional Reading
Appendix Solutions to Selected Problems
Solutions to Problems in Chapter 8
Problem 8.6
Solutions to Problems in Chapter 12
Problem 12.4
Solutions to Problems in Chapter 13
Problem 13.4
Problem 13.5
Problem 13.9
Problem 13.13
Solutions to Problems in Chapter 15
Problem 15.3
Problem 15.5
Problem 15.6
Problem 15.7
Problem 15.9
Solutions to Problems in Chapter 18
Problem 18.3
Problem 18.4
Problem 18.5
Problem 18.8
Problem 18.11
Problem 18.12
Problem 18.14
Problem 18.15
Problem 18.17
References
Symbol Index
Index.
Notes:
Also issued in print: 2023.
Includes bibliographical references and index.
Description based on online resource; title from PDF title page (viewed on April 12, 2023).
ISBN:
9781108598682
1108598684
9781108670203
1108670202
OCLC:
1376020366

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account