Contributions to provable security and efficient cryptography
نویسنده
چکیده
This thesis deals with two main matters of modern public key cryptography: provable security and efficient implementation. Indubitably, security is the most important property of any cryptographic scheme. Nevertheless, cryptographic algorithms have often been designed on a trial-and-error basis, i. e., a system has been regarded as secure as long as it withstood cryptanalytic attacks. In contrast, the provable security approach provides rigorous mathematical proofs within well-defined models. Nowadays, provable security is a key requirement for many applications. The main contribution of the first part of this thesis is the development and analysis of new provably secure trapdoor one-way permutations. (Trapdoor) one-way functions are the cardinal primitives in public key cryptography, as they are utilized as building blocks for numerous kinds of cryptographic protocols. For this reason, and because of the small number of promising candidates known today, the invention of new trapdoor one-way functions is of interest on its own. However, to prove the practical relevance of our proposal, we additionally invent several provably secure applications in the range of homomorphic encryption, fail-stop signature schemes, hybrid encryption, and trapdoor commitments. In the second part of this work, we will turn our attention to the efficient implementation of public key algorithms. Besides security, efficiency is the main criterion when evaluating cryptographic schemes because inefficient cryptosystems are of little practical value. In widely-used hand-held devices with scarce resources, cryptosystems based on elliptic curve point groups are the first choice today. Consequently, it is an active area of research to enhance the efficiency of elliptic curve scalar multiplication, which is the most common operation in these cryptosystems. Our contribution here is located in the field of multiplication methods with low memory requirements. We will introduce an algorithm which is as efficient as the state-of-the-art solution, but which significantly reduces the consumption of working memory. Moreover, we will develop a highly flexible variant which can be adapted to the exact amount of available storage. Therefore, the algorithms presented here are especially useful in connection with limited-constraint devices such as smart-cards.
منابع مشابه
Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs
The provable security paradigm originates from the work of Goldwasser and Micali [10] and plays a central role in modern cryptography. Since its inception, the focus of provable security has gradually shifted towards practice-oriented provable security [4]. The central goal of practice-oriented provable security is to develop and analyze efficient cryptographic systems that can be used for prac...
متن کاملPublic Key Encryption Algorithm and the Random Oracle
Cryptographic theory has provided a potentially invaluable notion for cryptographic practice: the idea of provable security. Unfortunately, theoretical work often gains provable security only at the cost of effciency. Schemes like standard RSA are efficient but not provably secured. There are schemes who are provably secured but are not efficient. However, there are encryption schemes, for eg. ...
متن کاملAn Efficient ID - based Proxy Blind Signature with Pairing - free Realization
Proxy blind Signature allows an original signer to delegate his/her signing capability to a proxy signer who performs message signing blindly on behalf of original signer but he cannot make any link between the blind signature and the identity of the message's owner. Using bilinear pairings, so many ID-based proxy blind signature (IDPBS) schemes have been proposed. But the computation cost of a...
متن کاملCryptographic Protocols, Sensor Network Key Management, and RFID Authentication
This thesis includes my research on efficient cryptographic protocols, sensor network key management, and radio frequency identification (RFID) authentication protocols. Key exchange, identification, and public key encryption are among the fundamental protocols studied in cryptography. There are two important requirements for these protocols: efficiency and security. Efficiency is evaluated usi...
متن کاملSecurity Issues in Querying Encrypted Data
There has been considerable interest in querying encrypted data, allowing a “secure database server” model where the server does not know data values. This paper shows how results from cryptography prove the impossibility of developing a server that meets cryptographicstyle definitions of security and is still efficient enough to be practical. The weaker definitions of security supported by pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006