11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Construction of (Hierarchical) <strong>Identity</strong>-<strong>Based</strong><br />

<strong>Encryption</strong> <strong>Protocols</strong> <strong>Using</strong> <strong>Bilinear</strong> <strong>Pairing</strong><br />

Thesis submitted to the Indian Statistical Institute in partial fulfillment of<br />

the requirements for the award of the degree of Doctor of Philosophy<br />

by<br />

Sanjit Chatterjee<br />

Applied Statistics Unit<br />

Indian Statistical Institute<br />

203, B.T. Road,<br />

Kolkata 700108.<br />

INDIA<br />

e-mail: sanjit t@isical.ac.in<br />

under the supervision of<br />

Dr. Palash Sarkar<br />

Applied Statistics Unit<br />

Indian Statistical Institute<br />

203, B.T. Road,<br />

Kolkata 700108.<br />

INDIA<br />

e-mail: palash@isical.ac.in

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!