Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/339940
Title: An investigation and design of post quantum privacy preserving signatures
Researcher: Thanalakshmi, P
Guide(s): Anitha, R
Keywords: Digital signatures
Authentication
University: Anna University
Completed Date: 2020
Abstract: Digital signatures play an extremely important role in software updates, online payments, e-banking, e-commerce, etc. It is considered to be the most important tool to provide authentication of a message and achieve information security. In the current era, most of the digital transactions use digital signatures that are publicly verifiable and they bind the signatory to the message. The privacy of signatures is a very sensitive and generic concept due to which different types of signatures have been evolved. Based on various situations and scenarios, many schemes have been proposed in the literature. In general, privacy providing signatures can be classified on the basis that they protect signers identity from being revealed to unauthorized parties which are not associated with it, or they make the signed message to pre-designated parties private. Various types of non-transferable signatures are available and some of them are undeniable signatures, designated verifier signatures, chameleon signatures, nominative signatures, universally designated verifier signatures, etc. The majority non-transferrable signatures are constructed based on the hardness of discrete logarithm problem and integer factorization problem. However, these problems could be solved in polynomial time by quantum computer (Shor 1994). Hence, it is of utmost importance to develop non-transferable signatures which remain secure even when the adversary has access to a quantum computer. In an attempt to address this problem, this research proposes non-transferable signature schemes that are secure and safe to quantum attacks Hash-based signature schemes are considered as an efficient replacement to those schemes that are vulnerable to quantum computer attacks. One of the primary advantages in the construction of this scheme is that it does not require any specific complex algebraic structures and mathematical operations, but has very minimal requirements such as the existence of cryptographic hash functions. These functions ensure the integrity
Pagination: xiv,161 p.
URI: http://hdl.handle.net/10603/339940
Appears in Departments:Faculty of Science and Humanities

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File21.62 kBAdobe PDFView/Open
02_certificates.pdf181.93 kBAdobe PDFView/Open
03_vivaproceedings.pdf553.14 kBAdobe PDFView/Open
04_bonafidecertificate.pdf227.58 kBAdobe PDFView/Open
05_abstracts.pdf30.05 kBAdobe PDFView/Open
06_acknowledgements.pdf315.6 kBAdobe PDFView/Open
07_contents.pdf28.78 kBAdobe PDFView/Open
08_listoftables.pdf34.56 kBAdobe PDFView/Open
09_listoffigures.pdf30.08 kBAdobe PDFView/Open
10_listofabbreviations.pdf34.42 kBAdobe PDFView/Open
11_chapter1.pdf241.97 kBAdobe PDFView/Open
12_chapter2.pdf184.63 kBAdobe PDFView/Open
13_chapter3.pdf262.14 kBAdobe PDFView/Open
14_chapter4.pdf106.55 kBAdobe PDFView/Open
15_chapter5.pdf140.78 kBAdobe PDFView/Open
16_chapter6.pdf120.45 kBAdobe PDFView/Open
17_chapter7.pdf118.69 kBAdobe PDFView/Open
18_conclusion.pdf41.41 kBAdobe PDFView/Open
19_references.pdf61.91 kBAdobe PDFView/Open
20_listofpublications.pdf36.2 kBAdobe PDFView/Open
80_recommendation.pdf41.18 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: