Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.contributor.advisorAu, Man Ho (COMP)-
dc.creatorYu, Zuoxia-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/10435-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic University-
dc.rightsAll rights reserveden_US
dc.titleAddressing new challenges in public-key cryptographyen_US
dcterms.abstractPublic-key cryptography, introduced by Diffie and Hellman in 1976, has found numerous applications in reality. After years of development, public-key cryptography has been well-studied and is gradually becoming mature. However, the emerging of several exciting technologies in computer science, while bringing convenience to our daily life, also imposes new challenges to current public-key cryptographic systems deployed in practical applications. In this thesis, we focus on addressing some new challenges in two well-known representatives of public-key cryptography, namely, public-key encryption and digital signature. In particular, we aim at designing an encryption scheme suitable for flexible and efficient data-sharing in the cloud as well as enhancing its resilience against side-channel attacks. In addition, we investigate the real-world applicability of signature scheme in blockchain-based cryptocurrencies and explore how to strengthen the signature component of blockchain-based cryptocurrencies to be quantum safe. More precisely, we present the following results: - We present a new variant of public-key encryption named as cross-system proxy re-encryption, which could make data-sharing in the cloud flexible and efficient. It allows one to transform ciphertext of a large class of attribute-based encryption schemes (a variant of public-key encryption that supports fine-grained control over the decryption ability) into ciphertext of any public-key encryption scheme. - We present a general framework for constructing attribute-based encryption schemes secure against side-channel attacks. - We present the best possible statistical attack for tracing payers' identity in transactions of privacy-preserving blockchain-based cryptocurrencies based on ring signature. We also fnd that if some natural conditions are satisfied, our attack will not compromise security of the cryptocurrency. In this way, we identify a safe mode to use public-key cryptographic schemes in a blockchain-based cryptocurrency. - We present the first lattice-based universal accumulator secure against quantum attacks. This primitive can be used to construct quantum safe dynamic group signature, a widely-used variant of digital signature that can be used to protect signers' identity.en_US
dcterms.extentxviii, 147 pages : color illustrationsen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2020en_US
dcterms.educationalLevelPh.D.en_US
dcterms.educationalLevelAll Doctorateen_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertationsen_US
dcterms.LCSHData encryption (Computer science)en_US
dcterms.LCSHComputer securityen_US
dcterms.LCSHComputer networks -- Security measuresen_US
dcterms.accessRightsopen accessen_US

Files in This Item:
File Description SizeFormat 
991022379157803411.pdfFor All Users934.63 kBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/10435