DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yoon, Hyunsoo | - |
dc.contributor.advisor | 윤현수 | - |
dc.contributor.author | Kim, Pyung | - |
dc.contributor.author | 김평 | - |
dc.date.accessioned | 2017-03-29T02:49:46Z | - |
dc.date.available | 2017-03-29T02:49:46Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=663203&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/222413 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 전산학부, 2016.8 ,[vi, 72 p. :] | - |
dc.description.abstract | As the amount of data in the cloud grows, the challenge of protecting data privacy of stored data in cloud is of significant importance. Data privacy can be achieved by storing data in encrypted form, but there are some technical issues performing operations over encrypted data. Therefore, Fully homomorphic encryption(FHE) scheme is a very suitable approach to delegate the ability to perform arbitrary operations securely without any exposure of the data privacy. Moreover, owing to the cloud server performing storage service mainly, sorting on encrypted data using FHE is a very important operation. In this dissertation, we focus on encrypted data processing and analyze security requirements. First, we present a new similarity-based multi-keyword search scheme for encrypted data without sorting method for encrypted data, and we provide the security and performance analysis of the scheme. Since the computed statistic values for search are not encrypted form in this scheme, we indicate security concerns in search process. Second, to complement the security problems, we suggest a faster (wall-clock time) sorting method for numerical data subjected to FHE. The proposed algorithm utilizes the cryptographic single-instruction multiple-data (SIMD) operation, which is supported by most existing FHE algorithms. We also provide an analytic method for FHE applications by the estimation of the number of required recryption operations, which are the computationally dominant operations in FHE, and verify the method. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | sorting | - |
dc.subject | computation over encrypted data | - |
dc.subject | fully homomorphic encryption | - |
dc.subject | search over encrypted data | - |
dc.subject | data privacy | - |
dc.subject | applied cryptography | - |
dc.subject | security | - |
dc.subject | 정렬 | - |
dc.subject | 암호화된 데이터 연산 | - |
dc.subject | 완전동형암호 | - |
dc.subject | 암호화된 데이터 검색 | - |
dc.subject | 데이터 프라이버시 | - |
dc.subject | 암호 응용 | - |
dc.subject | 보안 | - |
dc.title | Sorting method for fully homomorphic encrypted data using the cryptographic single-instruction multiple-data operation | - |
dc.title.alternative | 완전동형암호의 암호기법적 SIMD기능을 활용한 암호문 정렬 기술 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전산학부, | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.