Privacy-preserving information aggregation and authentication in distributed and mobile networks분산 및 이동 네트워크에서 프라이버시 보호를 제공하는 정보 수집과 인증에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 667
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorKim, Zeen-
dc.contributor.author김진-
dc.date.accessioned2013-09-12T02:08:24Z-
dc.date.available2013-09-12T02:08:24Z-
dc.date.issued2012-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=512031&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/181193-
dc.description학위논문(박사) - 한국과학기술원 : 정보통신공학과, 2012.8, [ vi, 69 p. ]-
dc.description.abstractThe development of computer system and network enabled us to use lots of useful applications in the field of information technology. As the exchange of information increases, the protection of the privacy becomes essential issue in information aggregation and sharing. Among the technology of the information security, this study attempted to seek a solution on the subject of secure data collection in distributed and mobile environments, and on the subject of method of effective authentication between multiple users. The goal of this thesis is to investigate privacy preserving methods in distributed and mobile networks. At first, we study on privacy-preserving information aggregation and sharing in distributed networks. Recently lots of privacy preserving set operations are proposed. When one set operation does not reveal any other elements except for the elements in the resulting set, it is said to be privacy-preserving set operation. Most of privacy preserving set operations is designed using polynomial representation of user`s private set. In this study we develop a polynomial operation algorithm on encrypted polynomials for getting fast implementation of privacy-preserving set operation based on the polynomial representation. We propose novel polynomial arithmetic algorithms of multiplication, expansion, and evaluation of encrypted polynomial using Karatsuba and divide-and-conquer methods. As the result of our proposed algorithms, the complexity of the set operation can be reduced from original O(k2) to O(klog2 3), where the k is the cardinality of user`s private set. We also study on the issue of finding most frequent top-k elements from multiparty information aggregation. Earlier researches on this issue failed to provide provable security since the rigorous security goals and adverarial model are not defined. In this study, we apply the provably-secure concepts to Privacy Preserving Top-k (PPT-k) protocols at first time. We also defined a new security notio...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectinformation aggregation-
dc.subjectauthentication-
dc.subjectpolynomial arithmetic-
dc.subjectdistributed network-
dc.subject정보수집-
dc.subject인증-
dc.subject다항식 연산-
dc.subject분산네트워크-
dc.subject이동네트워크-
dc.subjectmobile network-
dc.titlePrivacy-preserving information aggregation and authentication in distributed and mobile networks-
dc.title.alternative분산 및 이동 네트워크에서 프라이버시 보호를 제공하는 정보 수집과 인증에 관한 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN512031/325007 -
dc.description.department한국과학기술원 : 정보통신공학과, -
dc.identifier.uid020045909-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
ICE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0