Applied batch cryptography
Pavlovski, Christopher John (2000) Applied batch cryptography. PhD thesis, Queensland University of Technology.
The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography specifically, whilst the second deals with how this form of cryptography may be applied to security related applications such as electronic cash for improving efficiency of the protocols.
The objective of batch cryptography is to devise more efficient primitive cryptographic protocols. In general, these primitives make use of some property such as homomorphism to perform a computationally expensive operation on a collective input set. The idea is to amortise an expensive operation, such as modular exponentiation, over the input. Most of the research work in this field has concentrated on its employment as a batch verifier of digital signatures. It is shown that several new attacks may be launched against these published schemes as some weaknesses are exposed.
Another common use of batch cryptography is the simultaneous generation of digital signatures. There is significantly less previous work on this area, and the present schemes have some limited use in practical applications. Several new batch signatures schemes are introduced that improve upon the existing techniques and some practical uses are illustrated.
Electronic cash is a technology that demands complex protocols in order to furnish several security properties. These typically include anonymity, traceability of a double spender, and off-line payment features. Presently, the most efficient schemes make use of coin divisibility to withdraw one large financial amount that may be progressively spent with one or more merchants.
Several new cash schemes are introduced here that make use of batch cryptography for improving the withdrawal, payment, and deposit of electronic coins. The devised schemes apply both to the batch signature and verification techniques introduced, demonstrating improved performance over the contemporary divisible based structures. The solutions also provide an alternative paradigm for the construction of electronic cash systems.
Whilst electronic cash is used as the vehicle for demonstrating the relevance of batch cryptography to security related applications, the applicability of the techniques introduced extends well beyond this.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||QUT Thesis (PhD)|
|Supervisor:||Boyd, Colin, Looi, Mark, & Caelli, William|
|Additional Information:||Presented to the Information Security Research Centre, School of Data Communications, Queensland University of Technology.|
|Keywords:||Electronic funds transfers, Data encryption (Computer science), Cryptography, batch cryptography, electronic cash, digital signature, electronic commerce, micropayment, anonymous cash, digital cash, batch signature, batch verifyer, modular exponentiation, homomorphic property, multiplicative property, screing, binary tree, thesis, doctoral|
|Divisions:||Past > Institutes > Information Security Institute
Past > Schools > School of Software Engineering & Data Communications
|Institution:||Queensland University of Technology|
|Copyright Owner:||Copyright Christopher John Pavlovski|
|Deposited On:||22 Sep 2010 13:06|
|Last Modified:||25 Nov 2015 06:25|
Repository Staff Only: item control page