• University of Glasgow Featured PhD Programmes
  • University of Leeds Featured PhD Programmes
  • Medical Research Council, Harwell Featured PhD Programmes
  • Carlos III Health Institute Featured PhD Programmes
  • University of Bristol Featured PhD Programmes
  • FindA University Ltd Featured PhD Programmes
  • FindA University Ltd Featured PhD Programmes
  • University of Leeds Featured PhD Programmes
FindA University Ltd Featured PhD Programmes
IRB Barcelona Featured PhD Programmes
Manchester Metropolitan University Featured PhD Programmes
University of Glasgow Featured PhD Programmes
National University of Singapore Featured PhD Programmes

Generic applications of multilinear maps

This project is no longer listed in the FindAPhD
database and may not be available.

Click here to search the FindAPhD database
for PhD studentship opportunities
  • Full or part time
    Prof Davenport
  • Application Deadline
    Applications accepted all year round
  • Self-Funded PhD Students Only
    Self-Funded PhD Students Only

Project Description

Cryptographic bilinear maps -- i.e. bilinear functions f such that x=f(a,b) can easily be computed, but a cannot readily be computed from x and b, nor b from x and a -- have had a great deal of use in advanced cryptography. Extending these to multilinear maps has long been a wish of cryptographers. New constructions have recently been produced, shot down, strengthened, shot down again, and so on, in a struggle that shows no sign of ending. Hence one important question is what the generic characteristics of these multilinear map candidates are, and what protocols can be designed independent of the specific multilinear map, allowing modular replacement, as has been done in other areas of security

Funding Notes

We welcome all year round applications from self-funded candidates and candidates who can source their own funding.

References

See El Kaafarani,A., Chen,L., Ghadafi,E. & Davenport,J., Attribute-Based Signatures with User-Controlled Linkability. Cryptology and Network Security 2014, Springer Lecture Notes in Computer Science 8813, pp. 256-269.

Related Subjects

Share this page:

Cookie Policy    X