Secure and Reliable Communication I | |
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems | p. 1 |
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption | p. 2 |
Quantum Information and Communication | |
Interactive Hashing: An Information Theoretic Tool | p. 14 |
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network | p. 29 |
Networks and Devices | |
Strong Secrecy for Wireless Channels | p. 40 |
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks | p. 54 |
Does Physical Security of Cryptographic Devices Need a Formal Study? | p. 70 |
Mulitparty Computation | |
A Single Initialization Server for Multi-party Cryptography | p. 71 |
Statistical Security Conditions for Two-Party Secure Function Evaluation | p. 86 |
Information Hiding and Tracing | |
Upper Bounds for Set Systems with the Identifiable Parent Property | p. 100 |
Coding Theory and Security Oblivious Transfer Based on the McEliece Assumptions | p. 107 |
List Error-Correction with Optimal Information Rate | p. 118 |
Quantum Computation | |
Theory of Quantum Key Distribution: The Road Ahead | p. 120 |
Susceptible Two-Party Quantum Computations | p. 121 |
Secure and Reliable Communication II | |
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary | p. 137 |
Key Refreshing in Wireless Sensor Networks | p. 156 |
Efficient Traitor Tracing from Collusion Secure Codes | p. 171 |
Foundation | |
Revisiting the Karnin, Greene and Hellman Bounds | p. 183 |
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification | p. 199 |
The Complexity of Distinguishing Distributions | p. 210 |
Encryption | |
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security | p. 223 |
A Proof of Security in O(2[superscript n]) for the Xor of Two Random Pennutations | p. 232 |
Author Index | p. 249 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.