Archives and Documentation Center
Digital Archives

Extensions to asmuth bloom secret sharing scheme

Show simple item record

dc.contributor Graduate Program in Electrical and Electronic Engineering.
dc.contributor.advisor Anarım, Emin.
dc.contributor.author Ersoy, Oğuzhan.
dc.date.accessioned 2023-03-16T10:18:42Z
dc.date.available 2023-03-16T10:18:42Z
dc.date.issued 2015.
dc.identifier.other EE 2015 E78
dc.identifier.uri http://digitalarchive.boun.edu.tr/handle/123456789/12879
dc.description.abstract The term \Extensions" in the thesis title refers to homomorphism and veri ability additions to the Asmuth-Bloom scheme. Homomorphic abilities enable computations on hidden data without opening it, and veri ability eliminates the necessity of a trusted third party. Both abilities jointly facilitate secure multi-party computation. Multi-party computation has became one of the main research areas of the crypto-community with the goal to create a protocol to jointly compute a function using their inputs without revealing anything but the result. With the technological developments, the demand for personal data storage and computation have increased over the last decades. In order to maintain computational operations over the data, it is usually stored without encryption which brings along some privacy concerns. Rivest et al. proposed homomorphic encryption to overcome privacy issues, while keeping the functionality. After more than a quarter century, in 2009, Craig Gentry proposed the rst fully homomorphic encryption scheme, and security of his scheme relies on an assumption of the hardness of a mathematical problem, i.e. the approximate GCD problem. Nonetheless, unconditionally or information-theoretically secure computation can be done by secret sharing schemes. In this thesis, we explore homomorphic properties of a well-known secret sharing scheme: Asmuth-Bloom scheme. We propose several modi ed versions having homomorphic properties with their security analysis. Another important contribution of the thesis is related to Asmuth-Bloom based veri able secret sharing. First, we analyse the existing schemes and expose their weaknesses. Secondly, we propose the rst veri able secret sharing scheme secure against unbounded adversaries, and we apply this scheme to construct joint random secret sharing scheme.
dc.format.extent 30 cm.
dc.publisher Thesis (M.S.) - Bogazici University. Institute for Graduate Studies in Science and Engineering, 2015.
dc.subject.lcsh Homomorphisms (Mathematics)
dc.title Extensions to asmuth bloom secret sharing scheme
dc.format.pages xi, 70 leaves ;


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Archive


Browse

My Account