Doctoral Dissertations
Keywords and Phrases
Binary Decomposition; Cryptographic Primitives; Data Outsourcing; Proxy Re-Encryption; Query; Secure Comparison
Abstract
”Data outsourcing becomes an essential paradigm for an organization to reduce operation costs on supporting and managing its IT infrastructure. When sensitive data are outsourced to a remote server, the data generally need to be encrypted before outsourcing. To preserve the confidentiality of the data, any computations performed by the server should only be on the encrypted data. In other words, the encrypted data should not be decrypted during any stage of the computation. This kind of task is commonly termed as query processing over encrypted data (QPED).
One natural solution to solve the QPED problem is to utilize fully homomorphic encryption. However, fully homomorphic encryption is yet to be practical. The second solution is to adopt multi-server setting. However, the existing work is not efficient. Their implementations adopt costly primitives, such as secure comparison, binary decomposition among others, which reduce the efficiency of the whole protocols. Therefore, the improvement of these primitives results in high efficiency of the protocols. To have a well-defined scope, the following types of computations are considered: secure comparison (CMP), secure binary decomposition (SBD) and proxy re-encryption (PRE). We adopt the secret sharing scheme and paillier public key encryption as building blocks, and all computations can be done on the encrypted data by utilizing multiple servers. We analyze the security and the complexity of our proposed protocols, and their efficiencies are evaluated by comparing with the existing solutions.”--Abstract, page iii.
Advisor(s)
Jiang, Wei
Liu, Xiaoqing Frank
Committee Member(s)
Lin, Dan
Chellappan, Sriram
Wen, Xuerong Meggie
Department(s)
Computer Science
Degree Name
Ph. D. in Computer Science
Publisher
Missouri University of Science and Technology
Publication Date
Summer 2015
Pagination
ix, 98 pages
Note about bibliography
Includes bibliographic references (pages 87-97).
Rights
© 2015 Feng Li, All rights reserved.
Document Type
Dissertation - Open Access
File Type
text
Language
English
Thesis Number
T 12086
Recommended Citation
Li, Feng, "Efficient cryptographic primitives: Secure comparison, binary decomposition and proxy re-encryption" (2015). Doctoral Dissertations. 3131.
https://scholarsmine.mst.edu/doctoral_dissertations/3131