Progress on probabilistic encryption schemes

Uloženo v:
Podrobná bibliografie
Název: Progress on probabilistic encryption schemes
Autoři: Richardson, Kert
Zdroj: Theses
Informace o vydavateli: RIT Digital Institutional Repository
Rok vydání: 2006
Sbírka: Rochester Institute of Technology: RIT Scholar Works
Témata: Blum-Goldwasser cryptosystem, Chinese Remainder Theorem (CRT), Damgard-Jurik cryptosystem, Goldwasser-Micali cryptosystem, Homomorphic encryption, Java Cryptography Extension (JCE), Paillier cryptosystem, Probabilistic Encryption
Popis: The purpose of this master's project is to study different probabilistic cryptography schemes. The older probabilistic schemes, Goldwasser-Micali and Blum-Goldwasser, will only be covered briefly for a historical perspective. Several new and promising schemes have appeared in the last 7 years, generating interest. I will be examining the Paillier and Damgard-Jurik schemes in depth. This report explains the mathematics behind the schemes along with their inherent benefits, while also suggesting some potential uses. Details are given on how I optimized the algorithms, with special emphasis on using the Chinese Remainder Theorem (CRT) in the Damgard-Jurik algorithm as well as the other algorithms. One of the main benefits these schemes posses is the additively homomorphic property. I explain the homomorphic properties in the description of the schemes and give an overview of these properties in Appendix A. I create software based in the Java Cryptography Extension (JCE) that is used to do a comparative study. This includes a simple message passing program for encrypted text. I create my own implementations of Paillier, Damgard-Jurik, and a variation of Paillier's scheme as a Provider using the JCE. These implementations use the CRT along with other methods to increase performance and create optimized algorithms. The implementations are plugged into the message passing program with an implementation of RSA from another Provider. A comparative study of the timings of these three schemes is done to show which one performs better in different circumstances. Conclusions are drawn based on the results of the tests and my final opinions are stated.
Druh dokumentu: text
Popis souboru: application/pdf
Jazyk: unknown
Relation: https://repository.rit.edu/theses/6919; https://repository.rit.edu/context/theses/article/7924/viewcontent/KRichardsonMasterProject2005.pdf; https://repository.rit.edu/context/theses/article/7924/filename/0/type/additional/viewcontent/KRichardsonProposal2005.pdf
Dostupnost: https://repository.rit.edu/theses/6919
https://repository.rit.edu/context/theses/article/7924/viewcontent/KRichardsonMasterProject2005.pdf
https://repository.rit.edu/context/theses/article/7924/filename/0/type/additional/viewcontent/KRichardsonProposal2005.pdf
Přístupové číslo: edsbas.84C684C8
Databáze: BASE
Popis
Abstrakt:The purpose of this master's project is to study different probabilistic cryptography schemes. The older probabilistic schemes, Goldwasser-Micali and Blum-Goldwasser, will only be covered briefly for a historical perspective. Several new and promising schemes have appeared in the last 7 years, generating interest. I will be examining the Paillier and Damgard-Jurik schemes in depth. This report explains the mathematics behind the schemes along with their inherent benefits, while also suggesting some potential uses. Details are given on how I optimized the algorithms, with special emphasis on using the Chinese Remainder Theorem (CRT) in the Damgard-Jurik algorithm as well as the other algorithms. One of the main benefits these schemes posses is the additively homomorphic property. I explain the homomorphic properties in the description of the schemes and give an overview of these properties in Appendix A. I create software based in the Java Cryptography Extension (JCE) that is used to do a comparative study. This includes a simple message passing program for encrypted text. I create my own implementations of Paillier, Damgard-Jurik, and a variation of Paillier's scheme as a Provider using the JCE. These implementations use the CRT along with other methods to increase performance and create optimized algorithms. The implementations are plugged into the message passing program with an implementation of RSA from another Provider. A comparative study of the timings of these three schemes is done to show which one performs better in different circumstances. Conclusions are drawn based on the results of the tests and my final opinions are stated.