Computing on encrypted data using trusted execution environments / Andreas Fischer ; Advisors: Prof. Dr. Eric Bodden, Prof. Dr. Florian Kerschbaum. Paderborn, 2021
Inhalt
- Abstract
- Zusammenfassung
- Acknowledgments
- List of Figures
- List of Tables
- List of Definitions
- List of Theorems
- List of Constructions
- List of Algorithms
- Abbreviations
- Introduction
- Preliminaries
- Notation
- Common Cryptographic Principles
- Game-Based Security
- Encryption Schemes
- Message Authentication Codes
- Building Blocks for Message Authentication Codes
- Authenticated Encryption
- Probability and Information Theory
- Optimization Problems
- Related Work
- Encryption Schemes with Computation Support
- Other Cryptographic Primitives
- Program Transformation Techniques
- Trusted Execution Environments
- Methodology
- Solution Requirements
- Solution Design
- Practicality and Efficiency Assessment Methodology
- Security Assessment Methodology
- DFAuth: Dataflow Authentication
- Introduction
- Definitions
- Dataflow Authentication
- HASE Constructions
- Trusted Authenticated Ciphertext Operations
- Implementation
- Evaluation
- Secure Sales Application
- Additive HASE Benchmark
- Secure Neural Networks in the Cloud
- Secure Electric Vehicle Charging Scheduling
- Related Work
- Summary
- PASAPTO: Policy-Aware Security and Performance Trade-off Analysis
- Introduction
- Definitions
- Programs and Computation
- Adversary Model
- Information Flow Policy Compliance
- Security-Performance Trade-off Analysis
- Control Flow Leakage Quantification
- Policy-Aware Security and Performance Trade-off Analysis
- The PASAPTO Optimization Problem
- GreedyPASAPTO: A greedy heuristic
- GeneticPASAPTO: A genetic algorithm
- A PASAPTO Analysis for Dataflow Authentication
- Implementation
- Evaluation
- Related Work
- Summary
- Conclusion
- Publications and Contributions
