Publication details

Proposal of semiformal model of anonymity based cryptographic tasks and protocols and their analyses

Investor logo
Investor logo
Title in English Proposal of semiformal model of anonymity based cryptographic tasks and protocols and their analyse
Authors

ŠPROJCAR Josef

Year of publication 2008
MU Faculty or unit

Faculty of Informatics

Citation
Description The thesis investigates a broad area of cryptography dealing with anonymity. We proposed a semi-formal model of anonymous channels (protocols for anonymous communication). Our model is able to capture many aspects of wide range of types of anonymous communication, however, we concentrate mostly on sender anonymity, receiver anonymity and relationship anonymity. These are the most basic types of anonymity and many others can be either derived from them or only slight modifications are required to include them into our model. Our model is based on protocol graphs (graphs describing communication patterns). Security properties are based on comparing these protocol graphs. If certain properties hold we can speak about anonymity achieved by a protocol. Our model also includes a novel idea of "friends" - participants who are allowed to know identity of some anonymous participant. Several anonymous channels together with their dining cryptographers based protocols are also presented in the thesis. These include protocols for the most basic anonymous channels (these are private bipartite channels) as well as for several complex channels. We also present information-theoretically secure protocols that make use of quantum resources. We were able to build a quantum protocol for an anonymous channel for which no classical protocol is known to exist (in the same cryptographic settings). Based on these anonymous channels and their protocols we also scratched surface of resource based reduction between cryptographic protocols. Because of complexity of all the areas of our research the thesis is written in semi-formal language. The main reason is flexibility and feasibility of working with the model. We use the well known language that is often used in IT security.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info