English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 93244/123616 (75%)
Visitors : 27849095      Online Users : 465
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/84755

    Title: 同態加密與基於同態加密之秘密計算之研究
    Other Titles: A Research on Homomorphic Encryption and Its Applications to Secure Computing
    Authors: 左瑞麟
    Contributors: 資訊科學系
    Keywords: 雲端計算;同態加密;隱私保護;秘密計算
    cloud computing;homomorphic encryption;privacy protection;secure computing
    Date: 2012
    Issue Date: 2016-04-15 11:34:14 (UTC+8)
    Abstract: 雲端運算是近年來非常熱門的話題,是一種以網際網路為基礎的新世代運算方式。透過網路存取大量平行運算的軟硬體資源,使用者只需指派任務給雲端並接受運算結果,不需要知道雲的彼端有什麼樣的設施,也不用了解運算的原理或工作分配。在這樣的架構下,如何確保雲端運算的安全性成了一項非常重要的課題。與雲端運算相關的安全性課題或疑慮有很多,其中,如何確保用戶資訊隱私的安全,絕對是不能被忽略的。除了防止資訊被未授權的第三方存取之外,如何確保儲存在不可信的雲端服務提供者一端的資訊不被提供商惡意竊取或利用也是一項重要的課題。加密似乎是解決此一問題的最佳方案。但是,對資訊加密卻又造成了以密文的狀態儲存的資訊無法在雲端被處理或分析,影響了資訊在雲端上的運算。同態加密允許資訊在密文的狀態下被處理與分析,因此非常適合用於雲端的資料運算。但目前絕大部分的同態加密系統皆僅能處理部分同態的運算,亦即,加法同態或是乘法同態,亦或者是加法同態並結合一次的乘法同態。IBM的研究員Craig Gentry於2009年首先提出了完全同態加密(fully homomorphic encryption)的方案。在理論上實現了對加密資料進行完整運算分析的方法。完全同態加密能夠完全保障雲端使用者的重要資訊,因此可以加強雲端運算的商業模式(當使用者的重要資訊儲存於不可信的雲端服務提供者時)。但目前此研究仍僅止於理論研究的階段,因為其複雜的設計及需大量的計算降低了運算的效率。因此,在完全同態加密方案成為真正實用的工具前,還需要進行很多理論上的研究以改良現行的方案與提高其效率。本計畫的主要研究目標之一,就是希望在同態加密,甚至在完全同態加密的理論研究部分,提出我們的想法與貢獻,以期安全的雲端運算服務能夠早日實現。 雲端應用是趨勢。因此,除了同態加密的設計與改良之外,如何應用同態加密於現實生活中則是本計畫的另一個研究目標。例如,利用同態加密達成線上拍賣競標,線上商業談判,電子投票,雲端資料庫計算,線上登入…等。這些皆可以利用基於同態加密的秘密計算機制來達成。因此,本計畫在此部分主要探討應用的範疇為如何利用同態加密,設計出兼具安全與效率的安全秘密計算機制。也就是如何在不暴露資訊的情況下對資訊進行運算,以及做何種目的的運算這個問題。
    Cloud computing has come into limelight in recent years. It is considered as a new kind of computing technique which using resources from the Internet. Via the Internet to access to a large number of parallel computing resources, a cloud user can simply assign tasks to the cloud and accept the results without knowing the details on how such a cloud is constructed. In such a system, how to ensure the security of a cloud has become a very important issue. Concerning to this part, how to protect the privacy of users’ information is absolutely an important issue that cannot be ignored. In addition to prevent the information being accessed by unauthorized third parties from outside, how to ensure the secrecy and security of our stored data against untrusted cloud service providers is also an important issue. It seems that to encrypt our data before uploading it to a cloud can solve this problem. However, it causes another problem since an encrypted data cannot be operated on the cloud. Homomorphic encryption allows data to be operated and analyzed in the state of ciphertext so is ideal for cloud computing. Most of the existing homomorphic encryption schemes can only provide either additive homomorphic or multiplicative homomorphic but not both. Recently, Gentry in 2009 introduced the first fully homomorphic encryption scheme which is a breakthrough and has created a new research area in the field of homomorphic encryption as well as cloud computing. Nevertheless, this idea is still limited to the stage of theoretical research since the scheme is complicated and is extremely inefficient. One of the main topics of this project is to put forward our ideas in the design of (fully) homomorphic encryptions in order to strengthen the security of the services from cloud computing. Cloud computing is a trend that has been grown quickly. Therefore, in addition to design and improve the performance of homomorphic encryption schemes, how to apply the schemes on a cloud for real life applications is another research goal of this project. Secure computing allows users to launch very general queries on an encrypted database and to design efficient secure computing protocols with proofs are always a challenge. In this practical part, we will focus on the design of secure computing protocols based on homomorphic encryptions.
    Relation: 計畫編號 NSC101-2628-E004-001-MY2
    Data Type: report
    Appears in Collections:[資訊科學系] 國科會研究計畫

    Files in This Item:

    File Description SizeFormat
    101-2628-E004-001-MY2.pdf1601KbAdobe PDF319View/Open

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback