Browsing Combinatorics and Optimization by Subject "security"
Now showing items 1-4 of 4
-
Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem
(University of Waterloo, 2009-01-22)The Boneh-Boyen signature scheme is a short signature scheme which is provably secure in the standard model under the q-Strong Diffie-Hellman (SDH) assumption. The primary objective of this thesis is to examine the ... -
Digital Signature Scheme Variations
(University of Waterloo, 2002)A digital signature scheme is the process of signing an electronic message that can be transmitted over a computer network. Digital signatures provide message authentication that can be proved to a third party. With ... -
Post-Quantum Account Recovery for Passwordless Authentication
(University of Waterloo, 2023-04-24)WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ... -
Security Analysis of Isogeny-Based Cryptosystems
(University of Waterloo, 2020-08-20)Let $E$ be a supersingular elliptic curve over a finite field. In this document we study public-key encryption schemes which use non-constant rational maps from $E$. The purpose of this study is to determine if such ...