Application of Fuzzy Logic in Identity-Based Cryptography ; Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı

Uloženo v:
Podrobná bibliografie
Název: Application of Fuzzy Logic in Identity-Based Cryptography ; Bulanık Mantığın Kimlik Tabanlı Kriptografide Kullanımı
Autoři: Odyurt, Uraz
Informace o vydavateli: Linnéuniversitetet, Institutionen för matematik (MA)
Rok vydání: 2014
Sbírka: Linnaeus University Kalmar Växjö: Publications
Témata: Cryptography, Fuzzy logic, Identity-Based Encryption (IBE), Fuzzy Identity-Based Encryption (FIBE), Selective-ID model, Encryption scheme, Kriptografi, Bulanık mantık, Kimlik Tabanlı Şifreleme, Bulanık Kimlik Tabanlı Şifreleme, Seçici-ID modeli, Şifreleme şeması, Mathematics, Matematik
Popis: This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.
Druh dokumentu: bachelor thesis
Popis souboru: application/pdf
Jazyk: English
Dostupnost: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134
Rights: info:eu-repo/semantics/openAccess
Přístupové číslo: edsbas.C63B303B
Databáze: BASE
Popis
Abstrakt:This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.