Keeping secrets from those you work with : constructions and characterizations of encryption
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/91102 |
_version_ | 1826215535028731904 |
---|---|
author | Wilson, David A., Ph. D. Massachusetts Institute of Technology |
author2 | Shafi Goldwasser. |
author_facet | Shafi Goldwasser. Wilson, David A., Ph. D. Massachusetts Institute of Technology |
author_sort | Wilson, David A., Ph. D. Massachusetts Institute of Technology |
collection | MIT |
description | Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014. |
first_indexed | 2024-09-23T16:33:59Z |
format | Thesis |
id | mit-1721.1/91102 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T16:33:59Z |
publishDate | 2014 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/911022019-04-10T23:50:42Z Keeping secrets from those you work with : constructions and characterizations of encryption Wilson, David A., Ph. D. Massachusetts Institute of Technology Shafi Goldwasser. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014. 75 Cataloged from PDF version of thesis. Includes bibliographical references (pages 75-82). given to expanding the models in which encrypted messages are sent (leading to constructions such as identity-based encryption) and the additional functionalities supported by encryption schemes (such as homomorphic operations). This thesis explores the relations between several of these primitives and models, both in terms of generic constructions, and constructions based on specific hardness assumptions. First, we define bounded-collusion identity-based encryption (BC-IBE), a variant of IBE in which the adversary is only allowed to make a limited number of key queries. This restriction allows more general constructions; specifically, we give three distinct generic constructions of BC-IBE from public-key encryption with short ciphertext size. Each of these constructions requires slightly different properties of the underlying public-key scheme; we give specific instantiations of each of these constructions, thus achieving BC-IBE from the DDH, LWE, NTRU, and QR assumptions. Second, we explore the relationship between obfuscation and fully-homomorphic encryption. We define a notion of secure obfuscation for a family of functions known as the f-reencryption functionality, and prove that a secure obfuscator for this functionality generically yields a fully-homomorphic encryption scheme. Furthermore, we relate this new definition to previous definitions of obfuscation, and give an instantiation of such an obfuscator based on the LWE assumption, yielding an FHE construction. by David A. Wilson. Ph. D. 2014-10-21T17:26:11Z 2014-10-21T17:26:11Z 2014 2014 Thesis http://hdl.handle.net/1721.1/91102 892748802 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 82 pages application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Wilson, David A., Ph. D. Massachusetts Institute of Technology Keeping secrets from those you work with : constructions and characterizations of encryption |
title | Keeping secrets from those you work with : constructions and characterizations of encryption |
title_full | Keeping secrets from those you work with : constructions and characterizations of encryption |
title_fullStr | Keeping secrets from those you work with : constructions and characterizations of encryption |
title_full_unstemmed | Keeping secrets from those you work with : constructions and characterizations of encryption |
title_short | Keeping secrets from those you work with : constructions and characterizations of encryption |
title_sort | keeping secrets from those you work with constructions and characterizations of encryption |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/91102 |
work_keys_str_mv | AT wilsondavidaphdmassachusettsinstituteoftechnology keepingsecretsfromthoseyouworkwithconstructionsandcharacterizationsofencryption |