Vis enkel innførsel

dc.contributor.authorBrekne, Tønnesnb_NO
dc.date.accessioned2014-12-19T13:29:36Z
dc.date.available2014-12-19T13:29:36Z
dc.date.created2001-09-19nb_NO
dc.date.issued2001nb_NO
dc.identifier124876nb_NO
dc.identifier.isbn82-471-5331-9nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/249761
dc.description.abstractThe ability to construct software, call it a functional ciphertext, which can be remotely executed in encrypted form as an entirely self-contained unit, has the potential for some interesting applications. One such application is the construction of autonomous mobile agents capable of entering into certain types of legally binding contracts on behalf of the sender. At a premium in such circumstances is the ability to protect secret cryptographic keys or other secret information, which typically is necessary for legally binding contracts. Also important is the ability to do powerful computations, that are more than just one-off secure function evaluations. The problem of constructing computation systems that achieve this, has been attempted by many to little or no avail. This thesis presents three similar cryptographic systems that take a step closer to making such encrypted software a reality. First is demonstrated how one can construct mappings from finite automata, that through iteration can do computations. A stateless storage construction, called a Turing platform, is defined and it is shown that such a platform, in conjunction with a functional representation of a finite automaton, can perform Turing universal computation. The univariate, multivariate, and parametric ciphers for the encryption of multivariate mappings are presented and cryptanalyzed. Cryptanalysis of these ciphers shows that they must be used very carefully, in order to resist cryptanalysis. Entirely new to cryptography is the ability to remotely and securely re-encrypt functional ciphertexts made with either univariate or multivariate encryption. Lastly it is shown how the ciphers presented can be applied to the automaton representations in the form of mappings, to do general encrypted computation. Note: many of the novel constructions in this thesis are covered by a patent application.nb_NO
dc.languageengnb_NO
dc.publisherFakultet for informasjonsteknologi, matematikk og elektroteknikknb_NO
dc.relation.ispartofseriesDr.ingeniøravhandling, 0809-103X; 2001:67nb_NO
dc.subjecten_GB
dc.subjectTelekommunikationen_GB
dc.subjectTECHNOLOGY: Information technology: Telecommunicationen_GB
dc.titleEncrypted Computationnb_NO
dc.typeDoctoral thesisnb_NO
dc.source.pagenumber174nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikknb_NO
dc.description.degreedr.ing.nb_NO
dc.description.degreedr.ing.en_GB


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel