Use this URL to cite or link to this record in EThOS:
Title: Cryptographic protocols with anonymity preserving properties
Author: Lee , Ming-Feng
Awarding Body: University of Bristol
Current Institution: University of Bristol
Date of Award: 2013
Availability of Full Text:
Access from EThOS:
Anonymity means that a user can authenticate herself or use some service without leaking her identity. This thesis formally studies and analyzes cryptographic protocols with anonymity preserving properties. Some of these anonymity protocols are theoretically interesting and some are practically relevant. First of all , we investigate the Fiat- Shamir transform which is a popular tool for transforming identification protocols to sigl1ature schemes. We present a generic construction which yields group signature schemes from group identification schemes via the Fiat- Shamir transform. We then provide necessary and sufficient conditions for a group identification scheme to yield a secure group signature scheme (via the Fiat- Shamir transform). We then turn our attention to the enhanced privacy-CA solution (ePCAS) which was intended to withstand chosen compromised TPM attack against the TGC privacy-CA solution (PCAS) but had never been formally analyzed. We formalize three security properties desired from the PCAS and ePCAS protocols. We then prove that the ePCAS protocol indeed meets the security requirements that we formalize. Finally, we investigate the level of anonymity provided by the UNITS/LTE protocol. We quantify the limited form of anonymity via a formal security model. We consider two forms of anonymity for UNITS/LTE: one where the mobile stations under attack are statically selected before the execution, and a second one where the adversary selects these stations adaptively. We prove that the UMTS/LTE protocol meets both of the security definitions.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available