This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions, algorithms and motivating applications. The contributions are a step towards the development of cryptosystems which, from the design phase, incorporate privacy as a primary goal. Privacy offers a form of protection over personal and other sensitive data to individuals, and has been the subject of much study in recent years. Our constructions are based on a special type of algebraic group called bilinear groups. We present existing cryptographic constructions which use bilinear pairings, namely Identity-Based Encryption (IBE). We define a desirable property of digital signatures, blindness, and present new IBE constructions which...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions...
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions...
This thesis presents privacy enhanced cryptographic constructions, consisting of formal definitions...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Information systems generally involve storage and analytics of large-scale data, many of which may b...