Show simple item record

dc.contributor.advisorVinod Vaikuntanathan.en_US
dc.contributor.authorGorbunov, Sergeyen_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2015-11-09T19:51:18Z
dc.date.available2015-11-09T19:51:18Z
dc.date.copyright2015en_US
dc.date.issued2015en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/99825
dc.descriptionThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 159-169).en_US
dc.description.abstractClassical cryptography is playing a major role in securing the Internet. Banking transactions, medical records, personal and military messages are transmitted securely through the Internet using classical encryption and signature algorithms designed and developed over the last decades. However, today we face new security challenges that arise in cloud settings that cannot be solved effectively by these classical algorithms. In this thesis, we address three major challenges that arise in cloud settings and present new cryptographic algorithms to solve them. Privacy of data. How can a user efficiently and securely share data with multiple authorized receivers through the cloud? To address this challenge, we present attribute-based and predicate encryption schemes for circuits of any arbitrary polynomial size. Our constructions are secure under the standard learning with errors (LWE) assumption. Previous constructions were limited to Boolean formulas, captured by the complexity class NC1. Privacy of programs. How can a user share a program, which may include some secrets, preserving its functionality and without leaking any information about the secrets? Program obfuscation is a mechanism that allows to scramble a program preserving its input/output functionality while preventing reverse engineering. We describe a new graph-induced multilinear maps from lattices and show how it can be used to construct a candidate general purpose program obfuscator. Our construction uses standard (random) integer lattices. Previous constructions of mutilinear maps relied on hardness of problems in either principal ideal lattices or integers and were subjected to many algebraic attacks. Integrity of computations. How can a user outsource computations over a large database to the cloud and allow anyone efficiently authenticate the results? To address this, we present a fully homomorphic signature scheme for arbitrary circuits. The scheme allows the cloud server to run arbitrary computation, represented by circuit C, on the signed data x to get y = C(x) and produce a short "proof" o- that can be used by anyone to authenticate the output y. Our scheme is secure under the short integer solution (SIS) problem in standard lattices. Previous constructions of homomorphic signatures were limited to evaluating polynomials of constant degree.en_US
dc.description.statementofresponsibilityby Sergey Gorbunov.en_US
dc.format.extent169 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleCryptographic tools for the clouden_US
dc.typeThesisen_US
dc.description.degreePh. D.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.oclc927326994en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record