• Login
    View Item 
    •   DSpace@RPI Home
    • Rensselaer Libraries
    • RPI Theses Online (Complete)
    • View Item
    •   DSpace@RPI Home
    • Rensselaer Libraries
    • RPI Theses Online (Complete)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    An investigation of the theory and applications of homomorphic cryptography

    Author
    Kukucka, James Matthew
    View/Open
    167078_Kukucka_rpi_0185N_10067.pdf (1.558Mb)
    Other Contributors
    Yener, Bülent, 1959-; Magdon-Ismail, Malik; Zuker, Michael;
    Date Issued
    2013-05
    Subject
    Computer science
    Degree
    MS;
    Terms of Use
    This electronic version is a licensed copy owned by Rensselaer Polytechnic Institute, Troy, NY. Copyright of original work retained by author.;
    Metadata
    Show full item record
    URI
    https://hdl.handle.net/20.500.13015/856
    Abstract
    This thesis presents the field of homomorphic cryptography in a pedagogical manner. After introducing mathematical and conceptual preliminaries, we conduct a survey of somewhat-homomorphic cryptosystems - those which are limited in the number of operations that they can perform on ciphertexts. We then present a comparison of these cryptosystems, in both a theoretical and practical setting, using results from benchmarked implementations. We then conduct a survey of recent advances in the field of fully-homomorphic encryption - a relatively new field concerned with cryptosystems which allow an arbitrary number of computational operations to be conducted on ciphertexts. We then present some major applications of homomorphic cryptography, along with select implementations to frame the theory in a practical context. Finally, we conclude with open questions in the field and guidance for further research.; Homomorphic cryptography is a unique branch of cryptography concerned with the study of homomorphic cryptosystems. A homomorphic cryptosystem is one which has special mathematical properties that allow an untrusted third party to perform computations on encrypted data without the need to decrypt it. These cryptosystems have promising implications for the design of novel privacy-preserving protocols in a variety of applications such as electronic voting, multiparty computation, private information retrieval and private database queries.;
    Description
    May 2013; School of Science
    Department
    Dept. of Computer Science;
    Publisher
    Rensselaer Polytechnic Institute, Troy, NY
    Relationships
    Rensselaer Theses and Dissertations Online Collection;
    Access
    Restricted to current Rensselaer faculty, staff and students. Access inquiries may be directed to the Rensselaer Libraries.;
    Collections
    • RPI Theses Online (Complete)

    Browse

    All of DSpace@RPICommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    DSpace software copyright © 2002-2022  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV