Year

2015

Degree Name

Doctor of Philosophy

Department

School of Computer Science and Software Engineering

Abstract

This work in this thesis can be divided into two aspects. Firstly, we consider confidentiality and anonymity under a scenario where an untrusted third party is involved in a cryptographic system to check all the messages received. Then we study confidentiality, anonymity and integrity under a special atack called related-key attack. Lastly, we pay attention to data integrity in the setting of related-key attacks, and show how data integrity can be broken in a proof of retrievability system by a related-key attack and show how data integrity can be broken in a proof of retrievability system by a related-key attack adversary and how to prevent such attacks.

FoR codes (2008)

0804 DATA FORMAT

Share

COinS
 

Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong.