Pairing based non-repudiation protocols in cryptography

Download
2016
Sever, Ömer
Bilinear pairing on an elliptic curve is a mapping of a pair of elements on an elliptic curve into an element of a finite field. It is called symmetric when two elements of the domain are in the same group, it is called asymmetric otherwise. Generally symmetric pairings classified as Type-I and asymmetric pairings as Type-III. Type-II is a special case of Type-III which we don't consider in this thesis. Although the first use of bilinear pairings in cryptography has the intention to attack elliptic curve cryptosystems, in recent years they have been widely used to construct new encryption and signature schemes. As a main building block for non-repudiation protocols, signatures with different properties are implemented by using pairings on elliptic curves. Verifiably encrypted signature scheme due to Chen and Gu is a typical example for such a pairing based implementations. In the first part of this thesis, we propose an adaptation of certificateless public key cryptography to hybrid verifiably encrypted signature scheme due to Chen and Gu. This is called CL-HVESS. Then we expand CL-HVESS to Type-III pairings to mitigate the risks of recent attacks on Type-I pairings. In addition to this, we also present a replay attack to Chen and Gu protocol. In the second part we propose a non-repudiation protocol which has a new structure based on pairing based cryptography. The hybrid structure consists of two rounds; first round runs with an online Trusted Third Party (TTP) then second and next rounds run with offline TTP. Our contribution here is the usage of signed Joux Tri-partite key exchange scheme in the first round as a security enhancing method. In the third part we propose a new scheme that combines signcryption and verifiably encrypted signatures which we call VESigncrypt. We use it in a fair secret contract signing protocol. VESigncrypt has single recipient, multi recipient and publicly verifiable versions. To the best of our knowledge, this scheme is the first of its kind in the literature. In the last part of the thesis we first present a survey for isogeny based cryptography. Then, we propose a new verifiably encrypted probabilistic signature scheme based on isogenies. Finally we present new signature and verifiably encrypted signature schemes based on isogeny pairing groups. 

Suggestions

Modular exponentiation methods in cryptography
Yünüak, Hasan Bartu; Cenk, Murat; Department of Cryptography (2017)
Modular exponentiation has an important role in many cryptographic algorithms. These exponentiation methods differ in the bases used and their representations, the repeating aspect, and for which algorithms they are used for: fixed or variable base. Our research aims to compare the efficiencies and implementation timings for some selected algorithms. Also, we look at the options for using a dedicated cubing algorithm, and compare them with the current algorithms.
Transformation-based metamaterials to eliminate the staircasing error in the finite difference time domain method
Ozgun, Ozlem; Kuzuoğlu, Mustafa (Wiley, 2012-07-01)
A coordinate transformation technique is introduced for the finite difference time domain method to alleviate the effects of errors introduced by the staircasing approximation of curved geometries that do not conform to a Cartesian grid. An anisotropic metamaterial region, which is adapted to the Cartesian grid and designed by the coordinate transformation technique, is constructed around the curved boundary of the object, and the region occupied between the curved boundary and the inner boundary of the ani...
Monte Carlo analysis of ridged waveguides with transformation media
Ozgun, Ozlem; Kuzuoğlu, Mustafa (Wiley, 2013-07-01)
A computational model is presented for Monte Carlo simulation of waveguides with ridges, by combining the principles of transformation electromagnetics and the finite methods (such as finite element or finite difference methods). The principle idea is to place a transformation medium around the ridge structure, so that a single and easy-to-generate mesh can be used for each realization of the Monte Carlo simulation. Hence, this approach leads to less computational resources. The technique is validated by me...
Metamodeling complex systems using linear and nonlinear regression methods
Kartal, Elçin; Batmaz, İnci; Department of Statistics (2007)
Metamodeling is a very popular approach for the approximation of complex systems. Metamodeling techniques can be categorized according to the type of regression method employed as linear and nonlinear models. The Response Surface Methodology (RSM) is an example of linear regression. In classical RSM metamodels, parameters are estimated using the Least Squares (LS) Method. Robust regression techniques, such as Least Absolute Deviation (LAD) and M-regression, are also considered in this study due to the outli...
Knotting of algebraic curves in CP2
Finashin, Sergey (2002-01-01)
For any k⩾3, I construct infinitely many pairwise smoothly non-isotopic smooth surfaces homeomorphic to a non-singular algebraic curve of degree 2k, realizing the same homology class as such a curve and having abelian fundamental group ⧹ . This gives an answer to Problem 4.110 in the Kirby list (Kirby, Problems in low-dimensional topology, in: W. Kazez (Ed.), Geometric Topology, AMS/IP Stud. Adv. Math. vol 2.2, Amer. Math. Soc., Providence, 1997).
Citation Formats
Ö. Sever, “Pairing based non-repudiation protocols in cryptography,” Ph.D. - Doctoral Program, Middle East Technical University, 2016.