Show simple item record

dc.contributor.advisorArkady Yerukhimovich and Shafi Goldwasser.en_US
dc.contributor.authorSingh, Gaurav (Gaurav J.)en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2017-01-12T18:18:16Z
dc.date.available2017-01-12T18:18:16Z
dc.date.copyright2016en_US
dc.date.issued2016en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/106375
dc.descriptionThesis: M. Eng. in Computer Science and Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.en_US
dc.descriptionThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.en_US
dc.descriptionCataloged from student-submitted PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 95-102).en_US
dc.description.abstractIn functional encryption, keys are associated with functions, and ciphertexts with messages. Decrypting a message with a key gives the evaluation of the associated function on that message. We look at bounded-collusion functional encryption, where the number of keys for which security is guaranteed is bounded, as it is possible to realize using standard building blocks. For such schemes we aim to understand their practicality for real-world applications. There are some theoretical constructions of functional encryption, but few implementations. We rectify this by creating the Framework for Investigating Functional Encryption (FIFE). FIFE includes the first implementations for Sahai and Seyalioglu's one-key scheme (CCS 2010), and Gorbunov, Vaikuntanathan, and Wee's bounded-collusion scheme (CRYPTO 2012), and is easily extendable. We used FIFE to evaluate their performance, and to measure the impact of using different public-key or secret-key encryption schemes, bounds on collusion, and security levels, for interesting classes of functions.en_US
dc.description.statementofresponsibilityby Gaurav Singh.en_US
dc.format.extent129 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleFIFE : a Framework for Investigating Functional Encryptionen_US
dc.title.alternativeFramework for Investigating Functional Encryptionen_US
dc.typeThesisen_US
dc.description.degreeM. Eng. in Computer Science and Engineeringen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.oclc967348113en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record