Advances in signatures, encryption, and E-Cash from bilinear groups
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/37912 |
_version_ | 1826209295541207040 |
---|---|
author | Hohenberger, Susan Rae, 1978- |
author2 | Ronald L. Rivest. |
author_facet | Ronald L. Rivest. Hohenberger, Susan Rae, 1978- |
author_sort | Hohenberger, Susan Rae, 1978- |
collection | MIT |
description | Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006. |
first_indexed | 2024-09-23T14:20:16Z |
format | Thesis |
id | mit-1721.1/37912 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T14:20:16Z |
publishDate | 2007 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/379122019-04-12T08:53:02Z Advances in signatures, encryption, and E-Cash from bilinear groups Hohenberger, Susan Rae, 1978- Ronald L. Rivest. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006. Includes bibliographical references (p. 147-161). We present new formal definitions, algorithms, and motivating applications for three natural cryptographic constructions. Our constructions are based on a special type of algebraic group called bilinear groups. 1. Re-Signatures: We present the first public key signature scheme where a semi-trusted proxy, given special information, can translate Alice's signature on a message into Bob's signature on the same message. The special information, however, allows nothing else, i.e., the proxy cannot translate from Bob to Alice, nor can it sign on behalf of either Alice or Bob. We show that a path through a graph can be cheaply authenticated using this scheme, with applications to electronic passports. 2. Re-Encryption: We present the first public key cryptosystem where a semi-trusted proxy, given special information, can translate an encryption of a message under Alice's key into an encryption of the same message under Bob's key. Again, the special information allows nothing else, i.e. the proxy cannot translate from Bob to Alice, decrypt on behalf of either Alice or Bob, or learn anything else about the message. We apply this scheme to create a new mechanism for secure distributed storage. (cont.) 3. Compact; E-Cash with Tracing and Bounded-Anonymity: We present an offline e-cash system where 2 coins can be stored in O(e + k) bits and withdrawn or spent in 0(f + k) time, where k is the security parameter. The best previously known schemes required at least one of these complexities to be 0(2t . k). In our system, a user's transactions are anonymous and unlinkable, unless she performs a forbidden action, such as double-spending a coin. Performing a forbidden action reveals the identity of the user, and optionally allows to trace all of her past transactions. We provide solutions without using a trusted party. We argue why features of our system are likely to be crucial to the adoption of any e-cash system. by Susan Hohenberger. Ph.D. 2007-07-18T13:09:00Z 2007-07-18T13:09:00Z 2006 2006 Thesis http://hdl.handle.net/1721.1/37912 133169070 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 161 p. application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Hohenberger, Susan Rae, 1978- Advances in signatures, encryption, and E-Cash from bilinear groups |
title | Advances in signatures, encryption, and E-Cash from bilinear groups |
title_full | Advances in signatures, encryption, and E-Cash from bilinear groups |
title_fullStr | Advances in signatures, encryption, and E-Cash from bilinear groups |
title_full_unstemmed | Advances in signatures, encryption, and E-Cash from bilinear groups |
title_short | Advances in signatures, encryption, and E-Cash from bilinear groups |
title_sort | advances in signatures encryption and e cash from bilinear groups |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/37912 |
work_keys_str_mv | AT hohenbergersusanrae1978 advancesinsignaturesencryptionandecashfrombilineargroups |