Specifying and implementing privacy-preserving cryptographic protocols

Abstract

Formal methods are an important tool for designing and implementing secure cryptographic protocols. However, the existing work on formal methods does not cover privacy-preserving protocols as much as other types of protocols (for example, authentication protocols). Furthermore, privacy-related properties are not always easy or even possible to prove statically, but need to be checked dynamically during the protocol’s execution. This thesis: (i) proposes abstractions for some (relatively) complex cryptographic primitives used in privacy-preserving protocols, and uses these abstractions to develop suitable message constructors and a linkability-oriented type system for Typed MSR (a strongly typed specification language for security protocols), and (ii) demonstrates how these typed message constructors can be implemented in Jif (a security-oriented extension of a subset of the Java programming language dealing with information flow) in such a way that linkability vulnerabilities can be de ...
show more

All items in National Archive of Phd theses are protected by copyright.

DOI
10.12681/eadd/26092
Handle URL
http://hdl.handle.net/10442/hedi/26092
ND
26092
Alternative title
Προδιαγραφή και υλοποίηση κρυπτογραφικών πρωτοκόλλων ασφάλειας με απαιτήσεις διασφάλισης ιδιωτικότητας
Author
Balopoulos, Theodoros (Father's name: Ilias)
Date
2008
Degree Grantor
University of the Aegean
Committee members
Γκρίτζαλης Στέφανος
Κάτσικας Σωκράτης
Λαμπρινουδάκης Κωνσταντίνος
Χρυσικόπουλος Βασίλειος
Δαρζέντας Ιωάννης
Φωτάκης Δημήτριος
Κωτσάκης Σπυρίδων
Discipline
Natural SciencesComputer and Information Sciences
Keywords
Formal method; Typed MSR; Blind signature; Zero knowledge proof; Homomorphic encryption; Linkability; Dolev-Yao intruder
Country
Greece
Language
English
Usage statistics
VIEWS
Concern the unique Ph.D. Thesis' views for the period 07/2018 - 07/2023.
Source: Google Analytics.
ONLINE READER
Concern the online reader's opening for the period 07/2018 - 07/2023.
Source: Google Analytics.
DOWNLOADS
Concern all downloads of this Ph.D. Thesis' digital file.
Source: National Archive of Ph.D. Theses.
USERS
Concern all registered users of National Archive of Ph.D. Theses who have interacted with this Ph.D. Thesis. Mostly, it concerns downloads.
Source: National Archive of Ph.D. Theses.