de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
Schliessen
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Werk suchen
Computing on encrypted data using trusted execution environments / Andreas Fischer ; Advisors: Prof. Dr. Eric Bodden, Prof. Dr. Florian Kerschbaum. Paderborn, 2021
Inhalt
Abstract
Zusammenfassung
Acknowledgments
List of Figures
List of Tables
List of Definitions
List of Theorems
List of Constructions
List of Algorithms
Abbreviations
Introduction
Motivation
Contribution of this Work
Structure of this Work
Preliminaries
Notation
Common Cryptographic Principles
Game-Based Security
Encryption Schemes
Message Authentication Codes
Building Blocks for Message Authentication Codes
Authenticated Encryption
Probability and Information Theory
Optimization Problems
Multi-Objective Optimization Problems
The Hypervolume Indicator
Related Work
Encryption Schemes with Computation Support
Property-Preserving Encryption
Searchable Encryption
Functional Encryption
Homomorphic Encryption
Other Cryptographic Primitives
Secure Multi-Party Computation
Primitives for Access Pattern Hiding
Obfuscation Primitives
Program Transformation Techniques
Trusted Execution Environments
Intel Software Guard Extensions (SGX)
Attacks on Intel SGX
Methodology
Solution Requirements
Solution Design
Practicality and Efficiency Assessment Methodology
Security Assessment Methodology
DFAuth: Dataflow Authentication
Introduction
Definitions
Adversary Model
Homomorphic Authenticated Symmetric Encryption
Dataflow Authentication
HASE Constructions
Multiplicative HASE
Additive HASE
Security Reductions
Trusted Authenticated Ciphertext Operations
Syntax and Correctness
Security Definitions
Construction
Security Reductions
Implementation
Setup Phase
Runtime Phase
Evaluation
Secure Sales Application
Additive HASE Benchmark
Secure Neural Networks in the Cloud
Secure Electric Vehicle Charging Scheduling
Related Work
Summary
PASAPTO: Policy-Aware Security and Performance Trade-off Analysis
Introduction
Definitions
Programs and Computation
Adversary Model
Information Flow Policy Compliance
Security-Performance Trade-off Analysis
Control Flow Leakage Quantification
Two Program Security Measures
Variable-Specific Information Flow
Policy-Aware Security and Performance Trade-off Analysis
The PASAPTO Optimization Problem
GreedyPASAPTO: A greedy heuristic
GeneticPASAPTO: A genetic algorithm
A PASAPTO Analysis for Dataflow Authentication
Implementation
Evaluation
Electronic Sealed-Bid Auction
Decision Tree Evaluation
Related Work
Summary
Conclusion
Summary
Outlook
Publications and Contributions
Die detaillierte Suchanfrage erfordert aktiviertes Javascript.