Abstract
As set out in Section 12.1, cryptography enables cooperation in the presence of threats, based on limited trust between the participants involved, acting in a distributed computing system. In many cases, the participants follow a cryptographic protocol, executing several rounds of local computations and message transmissions. Such protocols are often composed of appropriate instantiations of more elementary cryptographic mechanisms, such as the basic blocks surveyed in Section 12.4 and treated more extensively in the preceding chapters. Moreover, even a particular “basic block” might be seen or might even have been designed as a protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
(2009). Some Further Cryptographic Protocols. In: Security in Computing Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78442-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-78442-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78441-8
Online ISBN: 978-3-540-78442-5
eBook Packages: Computer ScienceComputer Science (R0)