Skip navigation

Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/877
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPERUMAL, THANALAKSHMI-
dc.contributor.authorRAMALINGAM, ANITHA-
dc.date.accessioned2024-09-03T05:03:13Z-
dc.date.available2024-09-03T05:03:13Z-
dc.date.issued2020-09-25-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/877-
dc.description.abstractDigital signatures play an extremely important role in software updates, online payments, e-banking, e-commerce, etc. It is considered to be the most important tool to provide authentication of a message and achieve information security. As an ordinary digital signature is universally verifiable, it undesirable for those applications that are personally or commercially sensitive. In many applications such as e-voting, e-commerce, etc., privacy providing signatures are required. Non-transferable signatures are also called as private signatures that enable the signer or the recipient to decide who can verify the issued signature. Various types of non-transferable signatures are available and some of them are undeniable signatures, designated verifier signatures, chameleon signatures, nominative signatures, universally designated verifier signatures, etc. Majority of the non-transferrable signatures are constructed based on the hardness of discrete logarithm problems and integer factorization problem.However, these problems could be solved in polynomial time by quantum (Shor 1994). Hence, it is of utmost importance to develop non-transferable signatures which remain secure even when the adversary has access to a quantum computer. In an attempt to address this problem, this research proposes non-transferable signature schemes that are required for some real-time scenarios and are secure and safe to quantum attacks. The research extends hash-based and code-based ordinary signature schemes that are immune to classical and quantum attacks to digital signature schemes with additional properties that could render non-transferable signatures. It also provides construction of various hash-based and code-based non-transferable signature schemes.en_US
dc.language.isoenen_US
dc.publisherANNA UNIVERSITYen_US
dc.subjectDIGITAL SIGNATURESen_US
dc.subjectNON-TRANSFERABLE SIGNATURESen_US
dc.subjectPOST QUANTUM CRYPTOGRAHYen_US
dc.subjectCODE BASED CRYPTOGRAHYen_US
dc.subjectHASH BASED CRYPTOGRAHYen_US
dc.subjectRANDOM ORACLE MODELen_US
dc.titleAN INVESTIGATION AND DESIGN OF POST-QUANTUM PRIVACY PRESERVING SIGNATURESen_US
dc.typeThesisen_US
dc.contributor.Guide-
Appears in Collections:Applied Mathematical & Computational Sciences

Files in This Item:
File Description SizeFormat 
THANALAKSHMI.pdf178.35 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.