Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherCambridge University Press
ISBN-101108484336
ISBN-139781108484336
eBay Product ID (ePID)4058364511
Product Key Features
Book TitleInformation-Theoretic Cryptography
Number of Pages517 Pages
LanguageEnglish
Publication Year2023
TopicSignals & Signal Processing
IllustratorYes
GenreTechnology & Engineering
AuthorShun Watanabe, Himanshu Tyagi
FormatHardcover
Dimensions
Item Height1.2 in
Item Length9.8 in
Item Width6.9 in
Additional Product Features
LCCN2023-022458
Dewey Edition23
Reviews'This is a unique and extraordinary book covering everything on information-theoretic cryptography. It's a must-read book for all researchers and students interested in unconditional security.' Hirosuke Yamamoto, The University of Tokyo
Dewey Decimal652.8
Table Of Content1. Introduction; Part I. External Adversary: Encryption, Authentication, Secret Key: 2. Basic information theory; 3. Secret keys and encryption; 4. Universal hash families; 5. Hypothesis testing; 6. Information reconciliation; 7. Random number generation; 8. Authentication; 9. Computationally secure encryption and authentication; 10. Secret key agreement; Part II. Internal Adversary: Secure Computation: 11. Secret sharing; 12. Two-party secure computation for passive adversary; 13. Oblivious transfer from correlated randomness; 14. Bit commitment from correlated randomness; 15. Active adversary and composable security; 16. Zero-knowledge proof; 17. Two-party secure computation for active adversary; 18. Broadcast, Byzantine agreement, and digital signature; 19. Multiparty secure computation; Appendix. Solutions to selected problems; References; Notation index; Subject index.
SynopsisThis book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools., This introductory graduate coursebook offers a mathematical foundation for modern cryptography. Coverage includes secret key agreement, authentication, secret sharing, and secure computation. The book will also serve experts in the field as a reference for information-theoretic tools such as smooth min/max entropies and information spectrum.