Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. EPFL thesis
  4. Cryptography Under Counter-Intuitive Settings
 
doctoral thesis

Cryptography Under Counter-Intuitive Settings

Talayhan, Abdullah  
2025

In this thesis, we explore cryptographic protocols in three seemingly counter-intuitive settings or properties and attempt to achieve secure protocols under these settings.

First, we consider the problem of future proofing of classical signatures against quantum computers, particularly in blockchain systems. We attempt to solve this problem by simply hiding the public keys until necessary. While post-quantum cryptography standardization efforts are ongoing, we propose an immediate, practical solution for securing public ledger transactions during the transition process. We formalize the notion of digital signatures with hidden public keys. This seems counter-intuitive at first because the actual signature protocol being used is still classical but the public key is hidden. We present a generic transformation that converts these classical signatures into post-quantum ones suitable for single use.

Second, we approach the problem of letting someone else you don't trust manage your cryptographic actions through a formal framework for digital consent. Drawing parallels from real-world action of giving a consent, we develop a protocol that enables users to delegate cryptographic operations while maintaining security and accountability. Our framework uses simple cryptographic primitives, supports various authentication methods, and enables practical applications such as PDF signing and e-banking, while reducing the burden of managing high entropy key material for end users.

Finally, we investigate the seemingly contradictory requirements of anonymity and non-transferability in credential systems. We introduce and formalize non-transferable one-time anonymous tokens (NTAT), providing a construction with efficient implementation. Our solution achieves accountability, unlinkability, and non-transferability.

We observe that all the solutions to the above problems seem simple yet counter-intuitive at first but achievable by using the correct cryptographic primitives under suitable infrastructures.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

EPFL_TH10978.pdf

Type

Main Document

Version

Not Applicable (or Unknown)

Access type

openaccess

License Condition

N/A

Size

1.13 MB

Format

Adobe PDF

Checksum (MD5)

a94b3d71ea01c17842283ea7a31ab458

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés