• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

REALIZING INFORMATION ESCROWS AND EFFICIENT KEY-MANAGEMENT USING THRESHOLD CRYPTOGRAPHY

Easwar V Mangipudi (13169733) 29 July 2022 (has links)
<p>In this thesis, we address two applications of threshold cryptography — designing information escrows and key-distribution in cryptocurrency systems. We design escrow mechanisms in two-party and multi-party scenarios such that any unauthorized revelation of<br> data results in the loss of cryptocurrency by the dishonest party. Later, we discuss user mental models in adopting cryptocurrency wallets and propose a protocol to efficiently provide cryptographic keys to the users in large-user systems. An information escrow refers to users storing their data at a custodian such that it can be revealed later. In the case of unauthorized leakage of this data by the custodian (receiver of data), taking legal actions is expensive, time consuming and also difficult owing to difficulty in establishing the responsibility. We address this by automatically penalizing the custodian through the loss of cryptocurrency in case of leakage. Initially, we consider a two party scenario where a sender forwards multimedia data to a receiver; we propose the Pepal protocol<br> where any total or partial leakage of data penalizes the receiver. To avoid single point of failure at the receiver in a two-party system, we extend the protocol to a multi-party system where a group of agents offer the escrow as a service. However, this introduces a collusion scenario among the rational agents leading to premature and undetectable unlocking of the data. Addressing this, we propose a collusion-deterrent escrow (CDE) protocol where any collusion among the agents is penalized. We show that the provably secure protocol deters collusion in game-theoretic terms by dis-incentivising it among the rational agents. In the second part of this work, we investigate the mental models of cryptocurrency wallet users in choosing single-device or multi-device wallets along with their preferences. We investigate the user-preferred default (threshold) settings for the key distribution in the wallets. We then propose the D-KODE protocol, an efficient key-generation mechanism for<br> cryptocurrency systems where either the payee or payer may not have the cryptographic setup but wish to transact. The protocol utilizes a practical black-box secret sharing scheme along with a distributed almost key-homomorphic PRF to achieve the threshold key distribution.</p>
2

A Security Policy for a Distributed Utility Metering System

Burger, Rudolph Christiaan 06 July 2006 (has links)
This dissertation describes a security policy for a distributed utility metering system. The system uses untrusted networks, such as the Internet, to communicate between service providers (water, gas, electricity etc.) and the gateway servers at customer premises. Within a building, the system uses a low-bandwidth mains-borne network, or Field-Area Network (FAN), such as Fieldbus, to communicate between the gateway server and each of the utility meters. The FAN is regarded as untrusted, and communications to and from each utility meter must be protected from all other meters and any possible outsiders on the network. It must also be assumed that the gateway server is physically vulnerable to attack, and that its loss must not jeopardise the security of the system. Each service provider must be able to access each utility meter individually. Service providers can send commands to individual utility meters, and obtain individual meter readings applicable to their service. Service providers must not be able to interfere with one another’s service. However, the gateway must be able to interpret communications initiated by individual meters, to ensure that the alarm can be raised to service providers if a meter reading appears to have been tampered with. On high-bandwidth networks, well known symmetric and public-key cryptography techniques can easily provide the required features. However, with a low-bandwidth network such as FANs, the protocol must be carefully optimised to minimise the amount of data transmitted. This dissertation describes a new architecture, in which well-known cryptography principles are applied in the FAN field in a way that has not been described in the literature. / Dissertation (MEng)--University of Pretoria, 2007. / Electrical, Electronic and Computer Engineering / unrestricted

Page generated in 0.1052 seconds