Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/339940
Title: | An investigation and design of post quantum privacy preserving signatures |
Researcher: | Thanalakshmi, P |
Guide(s): | Anitha, R |
Keywords: | Digital signatures Authentication |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Digital signatures play an extremely important role in software updates, online payments, e-banking, e-commerce, etc. It is considered to be the most important tool to provide authentication of a message and achieve information security. In the current era, most of the digital transactions use digital signatures that are publicly verifiable and they bind the signatory to the message. The privacy of signatures is a very sensitive and generic concept due to which different types of signatures have been evolved. Based on various situations and scenarios, many schemes have been proposed in the literature. In general, privacy providing signatures can be classified on the basis that they protect signers identity from being revealed to unauthorized parties which are not associated with it, or they make the signed message to pre-designated parties private. Various types of non-transferable signatures are available and some of them are undeniable signatures, designated verifier signatures, chameleon signatures, nominative signatures, universally designated verifier signatures, etc. The majority non-transferrable signatures are constructed based on the hardness of discrete logarithm problem and integer factorization problem. However, these problems could be solved in polynomial time by quantum computer (Shor 1994). Hence, it is of utmost importance to develop non-transferable signatures which remain secure even when the adversary has access to a quantum computer. In an attempt to address this problem, this research proposes non-transferable signature schemes that are secure and safe to quantum attacks Hash-based signature schemes are considered as an efficient replacement to those schemes that are vulnerable to quantum computer attacks. One of the primary advantages in the construction of this scheme is that it does not require any specific complex algebraic structures and mathematical operations, but has very minimal requirements such as the existence of cryptographic hash functions. These functions ensure the integrity |
Pagination: | xiv,161 p. |
URI: | http://hdl.handle.net/10603/339940 |
Appears in Departments: | Faculty of Science and Humanities |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 21.62 kB | Adobe PDF | View/Open |
02_certificates.pdf | 181.93 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 553.14 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 227.58 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 30.05 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 315.6 kB | Adobe PDF | View/Open | |
07_contents.pdf | 28.78 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 34.56 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 30.08 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 34.42 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 241.97 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 184.63 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 262.14 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 106.55 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 140.78 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 120.45 kB | Adobe PDF | View/Open | |
17_chapter7.pdf | 118.69 kB | Adobe PDF | View/Open | |
18_conclusion.pdf | 41.41 kB | Adobe PDF | View/Open | |
19_references.pdf | 61.91 kB | Adobe PDF | View/Open | |
20_listofpublications.pdf | 36.2 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 41.18 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: