Fully Homomorphic Encryption Overview and Cryptanalysis

Fully Homomorphic Encryption Overview and Cryptanalysis

ID:41188339

大?。?56.24 KB

頁數(shù):69頁

時間:2019-08-18

Fully Homomorphic Encryption Overview and Cryptanalysis_第1頁
Fully Homomorphic Encryption Overview and Cryptanalysis_第2頁
Fully Homomorphic Encryption Overview and Cryptanalysis_第3頁
Fully Homomorphic Encryption Overview and Cryptanalysis_第4頁
Fully Homomorphic Encryption Overview and Cryptanalysis_第5頁
資源描述:

《Fully Homomorphic Encryption Overview and Cryptanalysis》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在學術(shù)論文-天天文庫。

1、TechnischeUniversit?atDarmstadtDepartmentofComputerScienceCryptographyandComputeralgebraDiplomaThesisJuly2011FullyHomomorphicEncryption:OverviewandCryptanalysisPatrickSchmidtTechnischeUniversit?atDarmstadtDepartmentofMathematicsSupervisedbyProf.Dr.JohannesBuchmannDr.RichardLindnerMichaelSchneide

2、rAcknowledgementsFirstofall,IwouldliketothankProf.JohannesBuchmannforgivingmetheopportunitytowritemythesisunderthistopicandgainknowledgeinthe eldoffullyhomomorphicschemesandmoreoverintheareaoflattices.Furthermore,manythanksgotomytwosupervisorsDr.RichardLindnerandMichaelSchneiderwhoo eredandspent

3、muchtimeansweringmeallmyinvestigatingquestionsandguidingmeintherightdirection.InadditionIwouldliketothankallpeoplethatsupportedmyworkonthisthesisbyproofreadingit, ndingspellingmistakesandlogicalerrorsaswellassupportingmeinimprovingthestructureofmythesisandits uentreading;asthereare:RichardFrankl

4、and,MainaOlembo,DeniseDemirel,andDr.MelanieVolkamer.Lastly,IthankallwhomIhaveforgottentomentionbefore!Withoutyourcontributionsthisworkwouldnotbewhatitactuallyis.WarrantyIherebydeclarethatthecontentofthisthesisisthedirectresultofmyownworkandthatanyuseofpublishedorunpublishedmaterialinthisthesisis

5、fullyandcorrectlyreferenced.Date:July14th,2011Signature:P.SchmidtiiiContentsIntroduction1I.ProgressonHomomorphicEncryptionandSignatureSchemes1.Preliminaries31.1.Lattices.....................................41.2.ComputationalProblems............................61.3.SecurityModels.................

6、................82.HomomorphicEncryptionSchemes132.1.Lattice-BasedEncryptionSchemes......................132.2.Integer-ArithmeticEncryptionSchemes...................243.HomomorphicSignatureSchemes293.1.AdditionalWorktoHomomorphicSignatureSchemes...........32II.CryptanalysisoftheGentry-HaleviFHES

7、cheme4.TheGentry-HaleviScheme334.1.BriefRecalloftheConstruction........................334.2.ParameterSelection..............................345.AttackingtheGentry-HaleviScheme355.1.AttackMethodologyandStrategies............

當前文檔最多預覽五頁,下載文檔查看全文

此文檔下載收益歸作者所有

當前文檔最多預覽五頁,下載文檔查看全文
溫馨提示:
1. 部分包含數(shù)學公式或PPT動畫的文件,查看預覽時可能會顯示錯亂或異常,文件下載后無此問題,請放心下載。
2. 本文檔由用戶上傳,版權(quán)歸屬用戶,天天文庫負責整理代發(fā)布。如果您對本文檔版權(quán)有爭議請及時聯(lián)系客服。
3. 下載前請仔細閱讀文檔內(nèi)容,確認文檔內(nèi)容符合您的需求后進行下載,若出現(xiàn)內(nèi)容與標題不符可向本站投訴處理。
4. 下載文檔時可能由于網(wǎng)絡(luò)波動等原因無法下載或下載錯誤,付費完成后未能成功下載的用戶請聯(lián)系客服處理。