This work in this thesis can be divided into two aspects. Firstly, we consider confidentiality and anonymity under a scenario where an untrusted third party is involved in a cryptographic system to check all the messages received. Then we study confidentiality, anonymity and integrity under a special atack called related-key attack. Lastly, we pay attention to data integrity in the setting of related-key attacks, and show how data integrity can be broken in a proof of retrievability system by a related-key attack and show how data integrity can be broken in a proof of retrievability system by a related-key attack adversary and how to prevent such attacks.
History
Year
2015
Thesis type
Doctoral thesis
Faculty/School
School of Computer Science and Software Engineering
Language
English
Disclaimer
Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong.