語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Efficient and adaptively secure cryp...
~
Zhou, Hong-Sheng.
FindBook
Google Book
Amazon
博客來
Efficient and adaptively secure cryptographic primitives---designing for composability.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Efficient and adaptively secure cryptographic primitives---designing for composability./
作者:
Zhou, Hong-Sheng.
面頁冊數:
150 p.
附註:
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
Contained By:
Dissertation Abstracts International71-09B.
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3420184
ISBN:
9781124157870
Efficient and adaptively secure cryptographic primitives---designing for composability.
Zhou, Hong-Sheng.
Efficient and adaptively secure cryptographic primitives---designing for composability.
- 150 p.
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
Thesis (Ph.D.)--University of Connecticut, 2010.
We study efficient protocol constructions against adaptive corruption in the universal composition framework. For standard cryptographic tasks, we propose a new framework to design efficiently two-party secure function evaluation protocols, and then apply it to oblivious transfer and obtain the first practical such constructions. Regarding reactive cryptographic tasks, we present a framework for designing blind signatures, and construct the first practical protocols for this task.
ISBN: 9781124157870Subjects--Topical Terms:
1669061
Engineering, Computer.
Efficient and adaptively secure cryptographic primitives---designing for composability.
LDR
:01388nam 2200277 4500
001
1399888
005
20110930095900.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124157870
035
$a
(UMI)AAI3420184
035
$a
AAI3420184
040
$a
UMI
$c
UMI
100
1
$a
Zhou, Hong-Sheng.
$3
1678897
245
1 0
$a
Efficient and adaptively secure cryptographic primitives---designing for composability.
300
$a
150 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-09, Section: B, page: 5596.
500
$a
Adviser: Aggelos Kiayias.
502
$a
Thesis (Ph.D.)--University of Connecticut, 2010.
520
$a
We study efficient protocol constructions against adaptive corruption in the universal composition framework. For standard cryptographic tasks, we propose a new framework to design efficiently two-party secure function evaluation protocols, and then apply it to oblivious transfer and obtain the first practical such constructions. Regarding reactive cryptographic tasks, we present a framework for designing blind signatures, and construct the first practical protocols for this task.
590
$a
School code: 0056.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
University of Connecticut.
$3
1017435
773
0
$t
Dissertation Abstracts International
$g
71-09B.
790
1 0
$a
Kiayias, Aggelos,
$e
advisor
790
$a
0056
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3420184
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9163027
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入