Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/511587
Title: Isogeny based Quantum Resistant Undeniable Blind Signature and Authenticated Encryption Schemes
Researcher: Srinath, M S
Guide(s): Chandrasekaran, V. and Patankar, Vijay M
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Sri Sathya Sai Institute of Higher Learning
Completed Date: 2018
Abstract: Post-quantum cryptography refers to the study and analysis of cryptographic newlinetechniques that are meant to be secure in the presence of quantum computers. In newlinethe future, digital communication systems need to be secure against an adversary newlinewho has access to quantum hardware. newlineBearing the above need in focus, the research work in this thesis consists of newlinefour contributions in isogeny-based cryptography viz., (i) the undeniable blind newlinesignature scheme, (ii) the authenticated encryption scheme, (iii) an algorithm to newlinesolve generalized root extraction problem and finally (iv) an optimized algorithm newlinefor the undeniable signature scheme proposed by Jao and Soukharev [48]. An newlineabstract of each of these contributions are given below. newlineAn undeniable blind signature scheme (UBSS) based on isogenies between supersingular elliptic curves is proposed. The contribution begins with a formal definition of the notion of an UBSS. A study of its abstract properties and a discussion newlineon its applicability are presented. Based on the generic foundation of UBSS described above, a specific UBSS is constructed. This construction is built upon the newlineundeniable signature scheme proposed by Jao and Soukharev [48]. The proposed newlinescheme is then proved to be quantum secure under certain hardness assumptions. newlineA quantum resistant authenticated encryption scheme is presented. The generic newlineconstruction is based on a suitable modification that combines the classical BellareNamprempre [12] security model for authenticated encryption with Boneh-Zhandry newlineadaptations [15] to provide security in the presence of quantum adversaries. Once newlinethis is formulated, an authenticated encryption scheme based on isogenies between supersingular elliptic curves is presented. This specific scheme has been newlineimplemented for 128-bit security level newline
Pagination: 
URI: http://hdl.handle.net/10603/511587
Appears in Departments:Department of Mathematics and Computer Science

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File92.19 kBAdobe PDFView/Open
abstract.pdf154.75 kBAdobe PDFView/Open
annex.pdf253.15 kBAdobe PDFView/Open
chapter 1.pdf377.94 kBAdobe PDFView/Open
chapter 2.pdf400.56 kBAdobe PDFView/Open
chapter 3.pdf352.62 kBAdobe PDFView/Open
chapter 4.pdf447.37 kBAdobe PDFView/Open
chapter 5.pdf416.96 kBAdobe PDFView/Open
chapter 6.pdf382.72 kBAdobe PDFView/Open
chapter 7.pdf100.55 kBAdobe PDFView/Open
contents.pdf109.41 kBAdobe PDFView/Open
prelim.pdf3.4 MBAdobe PDFView/Open
title.pdf251.38 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: