Login (DCU Staff Only)
Login (DCU Staff Only)

DORAS | DCU Research Repository

Explore open access research and scholarly works from DCU

Advanced Search

Privacy Enhancing Protocols using Pairing Based Cryptography

Sheedy, Caroline (2010) Privacy Enhancing Protocols using Pairing Based Cryptography. PhD thesis, Dublin City University.

Abstract
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions, algorithms and motivating applications. The contributions are a step towards the development of cryptosystems which, from the design phase, incorporate privacy as a primary goal. Privacy offers a form of protection over personal and other sensitive data to individuals, and has been the subject of much study in recent years. Our constructions are based on a special type of algebraic group called bilinear groups. We present existing cryptographic constructions which use bilinear pairings, namely Identity-Based Encryption (IBE). We define a desirable property of digital signatures, blindness, and present new IBE constructions which incorporate this property. Blindness is a desirable feature from a privacy perspective as it allows an individual to obscure elements such as personal details in the data it presents to a third party. In IBE, blinding focuses on obscuring elements of the identity string which an individual presents to the key generation centre. This protects an individual's privacy in a direct manner by allowing her to blind sensitive elements of the identity string and also prevents a key generation centre from subsequently producing decryption keys using her full identity string. Using blinding techniques, the key generation centre does not learn the full identity string. In this thesis, we study selected provably-secure cryptographic constructions. Our contribution is to reconsider the design of such constructions with a view to incorporating privacy. We present the new, privacy-enhanced cryptographic protocols using these constructions as primitives. We refine useful existing security notions and present feasible security definitions and proofs for these constructions.
Metadata
Item Type:Thesis (PhD)
Date of Award:January 2010
Refereed:No
Supervisor(s):Blott, Stephen
Uncontrolled Keywords:Cryptography
Subjects:Computer Science > Computer security
Mathematics > Applied Mathematics
DCU Faculties and Centres:DCU Faculties and Schools > Faculty of Engineering and Computing > School of Computing
Use License:This item is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 3.0 License. View License
Funders:Science Foundation Ireland
ID Code:15368
Deposited On:04 Apr 2011 15:26 by Stephen Blott . Last Modified 19 Jul 2018 14:50
Documents

Full text available as:

[thumbnail of Caroline Sheedy's PhD Thesis]
Preview
PDF (Caroline Sheedy's PhD Thesis) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
780kB
Downloads

Downloads

Downloads per month over past year

Archive Staff Only: edit this record