DocumentCode :
2144230
Title :
Complexity theoretic analysis of crypto-protocols-overview
Author :
Yacobi, Y.
Author_Institution :
Bellcore, Morristown, NJ, USA
fYear :
1991
fDate :
18-20 Jun 1991
Firstpage :
230
Lastpage :
233
Abstract :
Most of the complexity theoretic research on crypto-protocols has concentrated in two main directions. Developing general protocols to compute any multiparty function, and developing efficient protocols for specific functions. The general approach sharpened understanding of what is the exact meaning of `secure´ protocol, and resulted a rich new area of complexity theory, but in most cases resulted solutions which are currently too complex for any real usage. The second approach, which may be termed, the `applied´ approach benefited from the insight and the beauty of those new theories, but in most cases had to go its own way, not only in dealing with specific functions, but also in many cases in dealing with specific restricted adversaries (rather than `any random polynomial time adversary´). The author illustrates some examples from these areas
Keywords :
computational complexity; cryptography; protocols; complexity theoretic research; crypto-protocols; efficient protocols; multiparty function; restricted adversaries; Communication channels; Cryptographic protocols; Cryptography; Error correction; History; Polynomials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
Type :
conf
DOI :
10.1109/CSFW.1991.151594
Filename :
151594
Link To Document :
بازگشت