Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption

碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 102 === In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryptio...

Full description

Bibliographic Details
Main Authors: Wu, Shu-Yi, 吳姝儀
Other Authors: Ting, Pei-Yih
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/7m2yq9
id ndltd-TW-102NTOU5394030
record_format oai_dc
spelling ndltd-TW-102NTOU53940302019-05-15T21:51:46Z http://ndltd.ncl.edu.tw/handle/7m2yq9 Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption 應用於委託計算之隱藏密鑰政策電路的屬性加密系統 Wu, Shu-Yi 吳姝儀 碩士 國立臺灣海洋大學 資訊工程學系 102 In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryption should be in place to secure the confidential data and to protect proprietary algorithms; while designated protocol will be used to ensure the accuracy of the calculation results. This thesis presents a computation delegation using circuits hiding key-policy attribute-based encryption. And when used in cloud computing, it could detect errors in calculation and prevents the servers from knowing the exact algorithms used in the computation delegation. The system is based on multilinear maps and is proven selectively secure under k-MDDH assumption. Ting, Pei-Yih 丁培毅 2014 學位論文 ; thesis 40 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 102 === In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryption should be in place to secure the confidential data and to protect proprietary algorithms; while designated protocol will be used to ensure the accuracy of the calculation results. This thesis presents a computation delegation using circuits hiding key-policy attribute-based encryption. And when used in cloud computing, it could detect errors in calculation and prevents the servers from knowing the exact algorithms used in the computation delegation. The system is based on multilinear maps and is proven selectively secure under k-MDDH assumption.
author2 Ting, Pei-Yih
author_facet Ting, Pei-Yih
Wu, Shu-Yi
吳姝儀
author Wu, Shu-Yi
吳姝儀
spellingShingle Wu, Shu-Yi
吳姝儀
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
author_sort Wu, Shu-Yi
title Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
title_short Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
title_full Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
title_fullStr Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
title_full_unstemmed Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
title_sort computation delegation using circuits hiding key-policy attribute-based encryption
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/7m2yq9
work_keys_str_mv AT wushuyi computationdelegationusingcircuitshidingkeypolicyattributebasedencryption
AT wúshūyí computationdelegationusingcircuitshidingkeypolicyattributebasedencryption
AT wushuyi yīngyòngyúwěituōjìsuànzhīyǐncángmìyàozhèngcèdiànlùdeshǔxìngjiāmìxìtǒng
AT wúshūyí yīngyòngyúwěituōjìsuànzhīyǐncángmìyàozhèngcèdiànlùdeshǔxìngjiāmìxìtǒng
_version_ 1719121193150185472