Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée

Abstract : Internet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices.
Document type :
Theses
Complete list of metadatas

Cited literature [160 references]  Display  Hide  Download

https://tel.archives-ouvertes.fr/tel-01618878
Contributor : Abes Star <>
Submitted on : Wednesday, October 18, 2017 - 4:05:08 PM
Last modification on : Friday, March 1, 2019 - 3:05:14 PM
Long-term archiving on: Friday, January 19, 2018 - 2:17:49 PM

File

2017LIMO0042.pdf
Version validated by the jury (STAR)

Identifiers

  • HAL Id : tel-01618878, version 1

Collections

Citation

Quentin Alamélou. Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée. Cryptographie et sécurité [cs.CR]. Université de Limoges, 2017. Français. ⟨NNT : 2017LIMO0042⟩. ⟨tel-01618878⟩

Share

Metrics

Record views

380

Files downloads

2272