Abstract
In this chapter, we introduce what is security reduction and how to program a correct security reduction. We start by presenting an overview of important concepts and techniques, and then proof structures for digital signatures and encryption. We classify each concept into several categories in order to guide the reader to a deep understanding of security reduction. We devise and select some examples to show how to correctly program a full security reduction. Some definitions adopted in this book may be defined differently elsewhere in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Guo, F., Susilo, W., Mu, Y. (2018). Foundations of Security Reduction. In: Introduction to Security Reduction. Springer, Cham. https://doi.org/10.1007/978-3-319-93049-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-93049-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93048-0
Online ISBN: 978-3-319-93049-7
eBook Packages: Computer ScienceComputer Science (R0)