AMS eBook CollectionsOne of the world's most respected mathematical collections, available in digital format for your library or institution
Distributed Computing and Cryptography
About this Title
Joan Feigenbaum and Michael J. Merritt, Editors
Publication: DIMACS Series in Discrete Mathematics and Theoretical Computer Science
Publication Year:
1991; Volume 2
ISBN: 978-0-8218-6590-3 (print)
DOI: https://doi.org/10.1090/dimacs/002
MathSciNet review: MR1105537
MSC: Primary 68-06; Secondary 68P25, 94A60
This volume is not part of this online collection.
Table of Contents
Chapters
- Open questions, talk abstracts, and summary of discussions
- Formal definitions for secure distributed protocols
- Perfect privacy for two-party protocols
- On the structure of secret key exchange protocols
- Privacy-enhanced electronic mail
- Program result checking against adaptive programs and in cryptographic settings
- The scope of a logic of authentication
- Secure policy enforcement in internetworks
- On expected polynomial time simulation of zero knowledge protocols
- Cryptographic protection of databases and software
- Secret bit transmission using a random deal of cards
- Security against replay chosen-ciphertext attack
- New directions in testing
- Towards a theory of cryptographic systems: A critique of crypto-complexity
- Feedback in discrete communication
- On necessary conditions for secure distributed computation
- Secure IX network
- Reasoning about cryptographic protocols