学位论文详细信息
The Theory and Applications of Homomorphic Cryptography
cryptography;privacy;homomorphic cryptography;privacy homomorphism;threshold cryptography;Computer Science
Henry, Kevin
University of Waterloo
关键词: cryptography;    privacy;    homomorphic cryptography;    privacy homomorphism;    threshold cryptography;    Computer Science;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/3901/1/uw-ethesis.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】

Homomorphic cryptography provides a third party with the ability to perform simple computations on encrypted data without revealing any information about the data itself. Typically, a third party can calculate one of the encrypted sum or the encrypted product of two encrypted messages. This is possible due to the fact that the encryption function is a group homomorphism, and thus preserves group operations. This makes homomorphic cryptosystems useful in a wide variety of privacy preserving protocols.A comprehensive survey of known homomorphic cryptosystems is provided, including formal definitions, security assumptions, and outlines of security proofs for each cryptosystem presented. Threshold variants of several homomorphic cryptosystems are also considered, with the first construction of a threshold Boneh-Goh-Nissim cryptosystem given, along with a complete proof of security under the threshold semantic security game of Fouque, Poupard, and Stern. This approach is based on Shoup;;s approach to threshold RSA signatures, which has been previously applied to the Paillier and Damgaa rd-Jurik cryptosystems. The question of whether or not this approach is suitable for other homomorphic cryptosystems is investigated, with results suggesting that a different approach is required when decryption requires a reduction modulo a secret value.The wide variety of protocols utilizing homomorphic cryptography makes it difficult to provide a comprehensive survey, and while an overview of applications is given, it is limited in scope and intended to provide an introduction to the various ways in which homomorphic cryptography is used beyond simple addition or multiplication of encrypted messages. In the case of strong conditional oblivious tranfser, a new protocol implementing the greater than predicate is presented, utilizing some special properties of the Boneh-Goh-Nissim cryptosystem to achieve security against a malicious receiver.

【 预 览 】
附件列表
Files Size Format View
The Theory and Applications of Homomorphic Cryptography 775KB PDF download
  文献评价指标  
  下载次数:22次 浏览次数:74次