Skip to Main Content


AMS eBook CollectionsOne of the world's most respected mathematical collections, available in digital format for your library or institution


Distributed Computing and Cryptography


About this Title

Joan Feigenbaum and Michael J. Merritt, Editors

Publication: DIMACS Series in Discrete Mathematics and Theoretical Computer Science
Publication Year: 1991; Volume 2
ISBN: 978-0-8218-6590-3 (print)
DOI: https://doi.org/10.1090/dimacs/002
MathSciNet review: MR1105537
MSC: Primary 68-06; Secondary 68P25, 94A60

This volume is not part of this online collection.

Read more about this volume

View other years and volumes:

Table of Contents


Chapters

  • Open questions, talk abstracts, and summary of discussions
  • Formal definitions for secure distributed protocols
  • Perfect privacy for two-party protocols
  • On the structure of secret key exchange protocols
  • Privacy-enhanced electronic mail
  • Program result checking against adaptive programs and in cryptographic settings
  • The scope of a logic of authentication
  • Secure policy enforcement in internetworks
  • On expected polynomial time simulation of zero knowledge protocols
  • Cryptographic protection of databases and software
  • Secret bit transmission using a random deal of cards
  • Security against replay chosen-ciphertext attack
  • New directions in testing
  • Towards a theory of cryptographic systems: A critique of crypto-complexity
  • Feedback in discrete communication
  • On necessary conditions for secure distributed computation
  • Secure IX network
  • Reasoning about cryptographic protocols