Browse DORAS
Browse Theses
Latest Additions
Creative Commons License
Except where otherwise noted, content on this site is licensed for use under a:

Privacy Enhancing Protocols using Pairing Based Cryptography

Sheedy, Caroline (2010) Privacy Enhancing Protocols using Pairing Based Cryptography. PhD thesis, Dublin City University.

Full text available as:

PDF (Caroline Sheedy's PhD Thesis) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader


This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions, algorithms and motivating applications. The contributions are a step towards the development of cryptosystems which, from the design phase, incorporate privacy as a primary goal. Privacy offers a form of protection over personal and other sensitive data to individuals, and has been the subject of much study in recent years. Our constructions are based on a special type of algebraic group called bilinear groups. We present existing cryptographic constructions which use bilinear pairings, namely Identity-Based Encryption (IBE). We define a desirable property of digital signatures, blindness, and present new IBE constructions which incorporate this property. Blindness is a desirable feature from a privacy perspective as it allows an individual to obscure elements such as personal details in the data it presents to a third party. In IBE, blinding focuses on obscuring elements of the identity string which an individual presents to the key generation centre. This protects an individual's privacy in a direct manner by allowing her to blind sensitive elements of the identity string and also prevents a key generation centre from subsequently producing decryption keys using her full identity string. Using blinding techniques, the key generation centre does not learn the full identity string. In this thesis, we study selected provably-secure cryptographic constructions. Our contribution is to reconsider the design of such constructions with a view to incorporating privacy. We present the new, privacy-enhanced cryptographic protocols using these constructions as primitives. We refine useful existing security notions and present feasible security definitions and proofs for these constructions.

Item Type:Thesis (PhD)
Date of Award:January 2010
Supervisor(s):Blott, Stephen
Uncontrolled Keywords:Cryptography
Subjects:Computer Science > Computer security
Mathematics > Applied Mathematics
DCU Faculties and Centres:DCU Faculties and Schools > Faculty of Engineering and Computing > School of Computing
Use License:This item is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 3.0 License. View License
Funders:Science Foundation Ireland
ID Code:15368
Deposited On:04 Apr 2011 16:26 by Stephen Blott. Last Modified 04 Apr 2011 16:26

Download statistics

Archive Staff Only: edit this record