Sökning: "Homomorphic Signatures"

Hittade 3 avhandlingar innehållade orden Homomorphic Signatures.

  1. 1. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings

    Författare :Elena Pagnin; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Homomorphic Signatures; Server-Aided Verification; Distance-Bounding Authentication Protocols; Verifiable Com- putation; Biometric Authentication.;

    Sammanfattning : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. LÄS MER

  2. 2. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services

    Författare :Ala Sarah Alaqra; Simone Fischer-Hübner; Erik Wästlund; Steven Furnell; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; privacy enhancing technologies; human factors; malleable signatures; secret sharing; homomorphic encryption; Computer Science; Datavetenskap;

    Sammanfattning : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. LÄS MER

  3. 3. Outsourcing Computations to a Cloud That You Don't Trust

    Författare :Georgia Tsaloli; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; differential privacy; function secret sharing; homomorphic secret sharing; verifiable computation; privacy-preservation; public verifiability;

    Sammanfattning : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. LÄS MER