Show simple item record

dc.contributor.advisorShafi Goldwasser.en_US
dc.contributor.authorHolmgren, Justin Leeen_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2018-09-17T15:56:43Z
dc.date.available2018-09-17T15:56:43Z
dc.date.copyright2018en_US
dc.date.issued2018en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/118082
dc.descriptionThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 171-176).en_US
dc.description.abstractIn this thesis, we present two lines of research developing tools that, in addition to being of independent theoretical interest, yield improved protocols for secure out-sourcing of computation: Succinct Garbling Schemes. A garbling scheme is a way to encode a program P and input x as P̃̃ and x̃ such that P̃ can be evaluated on i to obtain P(x), but (P̃, x̃) reveals nothing more than P(x). We devise an efficient garbling scheme, based on the recent notion of indistinguishability obfuscation, in which the RAM running time and space usage of P on x are each the same as for P̃ on ,x̃. No-Signaling Multi-Prover Interactive Proofs. A multi-prover interactive proof (MIP) is a protocol by a which a "verifier" can ascertain the truth of a mathematical statement by interacting with two or more "provers" that cannot communicate with each other. We devise an MIP that achieves better efficiency and stronger soundness guarantees than previous constructions. In terms of efficiency, our MIP allows proving many statements with roughly the same (small) communication complexity as is required to prove a single statement. The soundness guarantee is that the verifier cannot be fooled even by malicious provers that can, in a very limited sense, collude in their messages to the verifier. The latter guarantee crucially enables an application to delegation of computation. Specifically, we obtain a protocol by which a weak device can outsource expensive computations to a powerful but untrusted server, while being assured that the computation is performed correctly.en_US
dc.description.statementofresponsibilityby Justin Lee Holmgren.en_US
dc.format.extent176 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleSecure computation on untrusted platformsen_US
dc.typeThesisen_US
dc.description.degreePh. D.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.oclc1052123725en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record