GitXplorerGitXplorer
w

diplomarbeit

public
2 stars
0 forks
0 issues

Commits

List of commits on branch master.
Unverified
ea947b44da59c60210306f5345eeed3fc9a210f2

MINOR: Add Demo Polynomial File (demo-input.poly)

wweissi committed 10 years ago
Unverified
6696880c3bc1f53e7ab155c00b52609e9e90eaa7

BUGFIX: Fix Token Concurrency Bug

wweissi committed 10 years ago
Unverified
8f6cb91f95cf06c6858232fbc1c0dd215ab047ad

MAJOR: Support for GHC 7.8.3 & New Conduit, ...

wweissi committed 10 years ago
Unverified
9b32349e68e13e4a19ce41868e99fcb1502b3914

MINOR: Compatibility with conduit >= 1.0

wweissi committed 12 years ago
Unverified
245429561065df543e1c0ae8de5327d2abc89455

Revert "MINOR: Restricted conduits Version"

wweissi committed 12 years ago
Unverified
a8a8d4c12f95d9d962bdb91467d882051a491784

MINOR: Restricted conduits Version

wweissi committed 12 years ago

README

The README file for this repository.

Diplomarbeit / Master's Thesis

This is the GitHub repository for my Diplomarbeit / Master's Thesis.

Abstract

Today, strong cryptography plays a very important role. Cryptography is of crucial importance mainly, but not limited, to important transactions via the Internet and other communication networks because the information should reach its destination reliably, confidentially and with integrity. The telematics research solves the reliability problem, but cryptography is used to ensure confidentiality and integrity. Since the overall problem is very complex, an increasing effort to use cryptographic primitives and protocols is discoverable. The benefit of this component based architecture is the possibility to prove the security of the components individually. Of course, the proofs must take into account the composability of the components which enables to build complex and secure systems from smaller building blocks.

This thesis concerns itself with cryptographic primitives for Secure Multi-Party Computations (MPC). MPC are joint computations of a set of parties which reveal the result of the computation to any party and nothing else. Every party should only learn information that can be calculated from its own input and the result. This thesis mainly deals with Oblivious Polynomial Evaluation (OPE), a subset of general MPC. OPE allows two parties to jointly evaluate a polynomial where the first party chooses the polynomial and learns nothing. The second party chooses the node and only learns the evaluated result of the polynomial at the chosen node. In addition to the evaluation of polynomials which is an obvious use case of OPE, OPE has many interesting applications, such as the share generation for Shamir's Secret Sharing. The methodology of this thesis also applies to the larger class of Secure Function Evaluation (SFE) which enables to securely evaluate arbitrary functions.

This thesis examines various approaches, leading to the novel result of a cryptographic protocol realizing OPE in linear time. The security of the methodology is proved in the Universal Composability (UC) framework which places very strict demands on the security of cryptographic protocols.

Alongside the theoretical debate, this thesis also features an efficient, secure and working implementation which manifests the properties of the protocol mentioned above.