Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 102 === In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryptio...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/7m2yq9 |
id |
ndltd-TW-102NTOU5394030 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NTOU53940302019-05-15T21:51:46Z http://ndltd.ncl.edu.tw/handle/7m2yq9 Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption 應用於委託計算之隱藏密鑰政策電路的屬性加密系統 Wu, Shu-Yi 吳姝儀 碩士 國立臺灣海洋大學 資訊工程學系 102 In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryption should be in place to secure the confidential data and to protect proprietary algorithms; while designated protocol will be used to ensure the accuracy of the calculation results. This thesis presents a computation delegation using circuits hiding key-policy attribute-based encryption. And when used in cloud computing, it could detect errors in calculation and prevents the servers from knowing the exact algorithms used in the computation delegation. The system is based on multilinear maps and is proven selectively secure under k-MDDH assumption. Ting, Pei-Yih 丁培毅 2014 學位論文 ; thesis 40 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 102 === In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryption should be in place to secure the confidential data and to protect proprietary algorithms; while designated protocol will be used to ensure the accuracy of the calculation results. This thesis presents a computation delegation using circuits hiding key-policy attribute-based encryption. And when used in cloud computing, it could detect errors in calculation and prevents the servers from knowing the exact algorithms used in the computation delegation. The system is based on multilinear maps and is proven selectively secure under k-MDDH assumption.
|
author2 |
Ting, Pei-Yih |
author_facet |
Ting, Pei-Yih Wu, Shu-Yi 吳姝儀 |
author |
Wu, Shu-Yi 吳姝儀 |
spellingShingle |
Wu, Shu-Yi 吳姝儀 Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
author_sort |
Wu, Shu-Yi |
title |
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
title_short |
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
title_full |
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
title_fullStr |
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
title_full_unstemmed |
Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption |
title_sort |
computation delegation using circuits hiding key-policy attribute-based encryption |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/7m2yq9 |
work_keys_str_mv |
AT wushuyi computationdelegationusingcircuitshidingkeypolicyattributebasedencryption AT wúshūyí computationdelegationusingcircuitshidingkeypolicyattributebasedencryption AT wushuyi yīngyòngyúwěituōjìsuànzhīyǐncángmìyàozhèngcèdiànlùdeshǔxìngjiāmìxìtǒng AT wúshūyí yīngyòngyúwěituōjìsuànzhīyǐncángmìyàozhèngcèdiànlùdeshǔxìngjiāmìxìtǒng |
_version_ |
1719121193150185472 |