dc.contributor.advisor | Arkady Yerukhimovich and Shafi Goldwasser. | en_US |
dc.contributor.author | Singh, Gaurav (Gaurav J.) | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. | en_US |
dc.date.accessioned | 2017-01-12T18:18:16Z | |
dc.date.available | 2017-01-12T18:18:16Z | |
dc.date.copyright | 2016 | en_US |
dc.date.issued | 2016 | en_US |
dc.identifier.uri | http://hdl.handle.net/1721.1/106375 | |
dc.description | Thesis: M. Eng. in Computer Science and Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016. | en_US |
dc.description | This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. | en_US |
dc.description | Cataloged from student-submitted PDF version of thesis. | en_US |
dc.description | Includes bibliographical references (pages 95-102). | en_US |
dc.description.abstract | In functional encryption, keys are associated with functions, and ciphertexts with messages. Decrypting a message with a key gives the evaluation of the associated function on that message. We look at bounded-collusion functional encryption, where the number of keys for which security is guaranteed is bounded, as it is possible to realize using standard building blocks. For such schemes we aim to understand their practicality for real-world applications. There are some theoretical constructions of functional encryption, but few implementations. We rectify this by creating the Framework for Investigating Functional Encryption (FIFE). FIFE includes the first implementations for Sahai and Seyalioglu's one-key scheme (CCS 2010), and Gorbunov, Vaikuntanathan, and Wee's bounded-collusion scheme (CRYPTO 2012), and is easily extendable. We used FIFE to evaluate their performance, and to measure the impact of using different public-key or secret-key encryption schemes, bounds on collusion, and security levels, for interesting classes of functions. | en_US |
dc.description.statementofresponsibility | by Gaurav Singh. | en_US |
dc.format.extent | 129 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Electrical Engineering and Computer Science. | en_US |
dc.title | FIFE : a Framework for Investigating Functional Encryption | en_US |
dc.title.alternative | Framework for Investigating Functional Encryption | en_US |
dc.type | Thesis | en_US |
dc.description.degree | M. Eng. in Computer Science and Engineering | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
dc.identifier.oclc | 967348113 | en_US |