Modification-Tolerant Signature Schemes Using Combinatorial Group Testing: Theory, Algorithms, and Implementation
| dc.contributor.author | Luo, Dongxia | |
| dc.contributor.supervisor | Moura, Lucia | |
| dc.date.accessioned | 2024-11-08T21:07:28Z | |
| dc.date.available | 2024-11-08T21:07:28Z | |
| dc.date.issued | 2024-11-08 | |
| dc.description.abstract | Matrices that are d-cover-free are used in non-adaptive combinatorial group testing (CGT). They allow for locating up to ddefectives within a set of nitems by testing them in groups. In non-adaptive group testing, all tests are determined before any are conducted. A group test yields a negative result if and only if all items in the group are non-defective. In this thesis, we study d-cover-free families (CFFs) built from set systems and codes. Examples of these include Sperner sets, Steiner Triple Systems, and Reed-Solomon codes. Our primary focus is on decoding algorithms of CGT, which are used to accurately identify all defectives based on the test results. We introduce a general decoding algorithm that relies solely on the d-CFF property of the matrix, as well as specialized algorithms designed according to the specific construction of d-CFFs. Additionally, we conduct experiments to evaluate the performance of each decoding method and compare the general and specialized algorithms, particularly in terms of their efficiency as n and d grow. This study also explores the application of non-adaptive combinatorial group testing using d-CFF to digital signatures. Digital signatures are mathematical schemes designed to ensure data integrity and authenticity of digital communications. They verify the authenticity of a signature and ensure that the signed document has not been tampered with. These schemes include classical methods like RSA-based and ECDSA, as well as post-quantum approaches such as FALCON and SPHINCS+. However, they lack the ability to identify the location of changes if a document has been modified. By incorporating d-CFFs into these digital signatures, we can not only verify the authenticity of the signature, but also locate up to dmodifications, leading to what is known as d-modification tolerant signature schemes(MTSS). Our work advances the study of modification-tolerant signature schemes (MTSS) by practically implementing d-MTSS for various document types. Key achievements include developing efficient data structures and decoding algorithms for different constructions of d-CFFs. We also conduct extensive testing of d-MTSS across multiple scenarios, and our results demonstrate its viability where document modifications are necessary. This research paves the way for future enhancements in data security and digital signature methods. | |
| dc.identifier.uri | http://hdl.handle.net/10393/49836 | |
| dc.identifier.uri | https://doi.org/10.20381/ruor-30673 | |
| dc.language.iso | en | |
| dc.publisher | Université d'Ottawa | University of Ottawa | |
| dc.subject | cover-free families | |
| dc.subject | combinatorial group testing | |
| dc.subject | cryptography | |
| dc.subject | digital signatures | |
| dc.subject | Reed-Solomon codes | |
| dc.title | Modification-Tolerant Signature Schemes Using Combinatorial Group Testing: Theory, Algorithms, and Implementation | |
| dc.type | Thesis | en |
| thesis.degree.discipline | Sciences / Science | |
| thesis.degree.level | Masters | |
| thesis.degree.name | MSc | |
| uottawa.department | Mathématiques et statistique / Mathematics and Statistics |
