The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

SECURE AND PRIVATE ONLINE COLLABORATION

Download

Download PDF Document
PDF

Author

Keith Frikken

Tech report number

CERIAS TR 2007-62

Entry type

phdthesis

Download

PDF

Key alpha

Frikken

School

Purdue University, CERIAS

Publication Date

2001-01-01

Contents

TABLE OF CONTENTS Page LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Thesis Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Summary of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Trust Negotiation . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.2 Credit Checking . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.3 Services for Location-Aware Devices . . . . . . . . . . . . . . 5 1.3.4 Contract Negotiation . . . . . . . . . . . . . . . . . . . . . . . 6 1.3.5 Biometric Authentication . . . . . . . . . . . . . . . . . . . . 6 1.4 Organization of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . 7 2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.1 Overview of Secure Computation . . . . . . . . . . . . . . . . . . . . 8 2.2 Definitions and Notations . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Models of Behavior for Secure Computations . . . . . . . . . . 9 2.2.2 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 A Formal Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3.1 Semi-Honest Adversaries . . . . . . . . . . . . . . . . . . . . . 11 2.3.2 Malicious Adversaries/Multiple Parties . . . . . . . . . . . . . 13 2.4 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.4.1 Two-party Computations . . . . . . . . . . . . . . . . . . . . . 13 2.4.2 Multi-party Computations and Stronger Adversary Models . . 14 Page 2.4.3 Alternate Models . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.4.4 Composition Theorems . . . . . . . . . . . . . . . . . . . . . . 15 2.4.5 Random Oracle Model . . . . . . . . . . . . . . . . . . . . . . 16 2.5 A Survey of Specific Secure Protocols . . . . . . . . . . . . . . . . . . 16 2.5.1 Oblivious Transfer . . . . . . . . . . . . . . . . . . . . . . . . 17 2.5.2 Private Information Retrieval . . . . . . . . . . . . . . . . . . 17 2.5.3 Set Intersection . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.5.4 Finding the kth Ranked Element . . . . . . . . . . . . . . . . 20 2.5.5 Yao

Location

A hard-copy of this is in the CERIAS Library

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.