Anonymity With Authenticity
Electronic Theses of Indian Institute of Science
View Archive InfoField | Value | |
Title |
Anonymity With Authenticity
|
|
Creator |
Swaroop, D
|
|
Subject |
Cryptography
Cryptanalysis Anonymous Systems (Communication) Symmetric Key Cryptography Public Key Cryptography Anonymous Systems (Communication) Protocols Computer Science |
|
Description |
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In this thesis we are going to describe an anonymous system which consists of a number of entities which are anonymous and are communicating with each other without revealing their identity and at the same time maintaining their authenticity such that an anonymous entity(sayE1)will be able to verify that, the message it received from another anonymous entity(sayE2)subsequent to an initial message from E2, are in fact from E2 itself. Later when E2 tries to recommend a similar communication to E1 with another anonymous entity E3 in the system, E1 must be able to verify that recommendation, without E2 losing its authenticity of its communication with E1 to E3. This thesis is divided into four chapters. The first chapter is an introduction to cryptography, symmetric key cryptography and public key cryptography. It also summarizes the contribution of this thesis. The second chapter gives various protocol for the above problem ’Anonymity with Authenticity’ along with its extension. Totally six protocols are proposed for the above problem. In third chapter all these six protocols are realized using four different schemes, where each scheme has its own pros and cons. The fourth and final chapter concludes with a note on what possible factors these four different realization schemes need to be chosen and other possible realization schemes. |
|
Contributor |
Rajan, B Sundar
|
|
Date |
2014-09-02T05:48:29Z
2014-09-02T05:48:29Z 2014-09-02 2011-12 |
|
Type |
Thesis
|
|
Identifier |
http://etd.iisc.ernet.in/handle/2005/2374
http://etd.ncsi.iisc.ernet.in/abstracts/3057/G25103-Abs.pdf |
|
Language |
en_US
|
|
Relation |
G25103
|
|