跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.89) 您好!臺灣時間:2025/01/26 03:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃中鼎
研究生(外文):Chung-Ting Huang
論文名稱:全同態加密結合雲端金流系統
論文名稱(外文):A Cashflow System on Cloud with Fully Homomorphic Encryption
指導教授:劉維正
指導教授(外文):Wei-Cheng Liu
口試委員:王蒞君黃國軒
口試委員(外文):Li-Chun WangKuo-Hsuan Huang
口試日期:2015-01-14
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:中文
論文頁數:98
中文關鍵詞:同態加密
外文關鍵詞:Homomorphic Encryption
相關次數:
  • 被引用被引用:0
  • 點閱點閱:398
  • 評分評分:
  • 下載下載:31
  • 收藏至我的研究室書目清單書目收藏:0
隨著科技的發展,網際網路的普及與許多雲端產品應用,使得雲端平台的服務越來越多。而雲端金流系統就是基於此背景所提出的新興金流服務,讓使用者在有網際網路的情況下,能將傳統銀行所提供的轉帳功能藉由雲端服務實現。然而,當今天銀行想利用委外雲端服務進行數據處理,但是又不希望伺服器能解讀我們的資料內容時,傳統的雲端金流加密系統將無法滿足我們的需求。有鑑於此,本研究提出將全同態加密演算法結合目前的雲端金流系統來解決上述問題。同態加密的概念是當我們對密文進行某種特定運算再將其解密,會等價於相對應的明文之運算結果,這讓我們能直接在密文上進行資料處理並仍能確保資料的正確性,進而達到在雲端運算而不將資料解密的功能。
With advances in technological development, as well as the popularity of cloud computing and the Internet, increasing numbers of cloud services have become available. The cash flow system of cloud computing constitutes a new cash flow service based on this large demand, which enables users to transfer funds over the Internet. However, when users want to transfer data to other users’ accounts for processing and do not want the servers to be able to decrypt the data, the traditional cash flow system is inadequate. To solve this problem, we propose to implement fully homomorphic encryption combined with the cash flow system of cloud computing. The concept of homomorphic encryption refers to when we perform a specific operation in ciphertext, the result after decryption is equivalent to the corresponding plaintext. Therefore, utilizing homomorphic encryption allows us to perform data processing in ciphertext, maintain data accuracy, achieve cloud computing, and securely protect the data from decryption.
誌謝 -----------------------------------------------------------------------------------------i
摘要 ----------------------------------------------------------------------------------------ii
Abstract----------------------------------------------------------------------------------------iii
目錄 ---------------------------------------------------------------------------------------iv
圖目錄 --------------------------------------------------------------------------------------vi

第一章 緒論………………………………………………………………………1
1.1緒論………………………………………………………………………………1
1.2 研究背景…………………………………………………………………………2
1.3 研究動機及目的…………………………………………………………………3
1.4 相關研究探討……………………………………………………………………4
1.5 論文架構…………………………………………………………………………4

第二章 理論背景……………………………………………………………………5
2.1 雲端運算…………………………………………………………………………5
2.1.1 何為雲端運算………………………………………………………………………6
2.1.2五大基礎特徵………………………………………………………………………7
2.1.3三個服務模式………………………………………………………………………8
2.1.4四個部署模型……………………………………………………………………11
2.2 近代密碼學……………………………………………………………………12
2.2.1 對稱式加密(Symmetric-key algorithm)………………………………………13
2.2.2 非對稱式加密(Asymmetric Key Cryptosystem)………………………………13
2.2.3雜湊函數(Hash Function)………………………………………………………15
2.2.4 區塊加密法………………………………………………………………………15
2.2.5 串流加密法………………………………………………………………………16
2.3 同態加密(Homomorphic Encryption) ………………………………………17
2.4 Gentry全同態加密……………………………………………………………19

第三章 基於LWE的SH 同態加密………………………………………………21
3.1各項參數值基本定義……………………………………………………………21
3.2密鑰生成SH.Keygen(1^κ)………………………………………………………21
3.3加密SH.Enc_pk(μ)…………………………………………………………….…22
3.4 同態運算SH.Eval_evk(f,c_1,…,c_2)…………………….………………………….…22
3.5 解密〖SH.Dec〗_(s_L )(c).…………………..………………………………..………..…23
3.6 加法同態驗證………………………………………………………………..…23
3.7 乘法同態加密驗證…………………………………………………………..…23

第四章 在雲端金流系統上實現同態加密…………………………………………26
4.1雲端金流系統……………………………………………………………………26
4.1.1 雲端金流系統定義…………………………………………………………………26
4.1.2 雲端金流系統-網路銀行服務……………………………………………………28
4.2 雲端金流系統結合同態加密…………………………………………29
4.3 SH同態加密演算法加密系統…………………………………………30
4.4 SH同態加密演算法模擬結果…………………………………………30
4.4.1 模擬參數設定……………………………………………………………31
4.4.2 實際模擬畫面……………………………………………………………31
4.5 SH同態加密演算法驗證效率分析及安全性目標…………..……..33


第五章 雲端金流系統結合SH同態加密演算法模擬……………………………38
5.1 模擬環境及參數設定…………………………………………………………38
5.2 模擬程式細節介紹……………………………………………………………38

第六章 結論與未來展望…………………………………………………………42

參考文獻 ………………………………………………………………………43
附錄 …………………………………………………………………………45

[1]R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun.of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
[2]T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, pp. 469–472, Jul. 1985.
[3]J. Russel and R. Cohn, Homomorphic encryption, Scotland, United Kingdom: NNX Corp., 2012.
[4]C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP J. on Inform. Security, pp. 1–15, Jan. 2007.
[5]S. Ciou and R. Tso, “A privacy preserved two-party equality testing protocol,” in Genetic and Evol. Computing Conf., Xiamen, China, 2011, pp. 220–223.
[6]B. Hayes, “Alice and Bob in cipherspace,” Amer. Scientists, vol. 100, no. 5, pp. 1, Sep. – Oct. 2012.
[7]Netscape. (2014, Aug. 14). Introduction to SSL, [Online]. Available: https://docs.oracle.com/cd/E19957-01/816-5565-10/app_ssl.htm
[8]P. Mell and T. Grance. “The NIST definition of cloud computing, ” NationalInsti-tute of Standards and Technology, pp. 50, 2009.
[9]A. Hiltgen, T. Kramp, and T. Weigold, “Secure internet banking authentication,” IEEE Security Privacy, vol. 4, no. 2, pp. 21–29, May 2006.
[10]P. Rewagad and Y. Pawar, “Use of digital signature with Diffie Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing ,” in Int. Conf. on Comput. Sci. and Network Technology, Dalian, China, 2013, pp. 438–439.
[11]D. Micciancio, “A first glimpse of cryptography's holy grail,” Commun. of the ACM, vol. 53, no. 3, pp. 96, Mar. 2010.
[12]E. Biham and A. Shamir, “Differentail cryptanalysis of DES-like cryptosystems,” J. of Cryptology, vol. 4, no. 1, pp. 3 –72, Jan. 1991.
[13]N. T. Courtois and J. Pieprzyk. (2014, Aug. 1). Cryptanalysis of block ciphers with overdefined systems of equation [Online]. Available: https://eprint.iacr.org/2002/044.pdf
[14]W. K. Ruwan and I. Prasanna, “Preserving privacy for community location-based mobile cloud application using homomorphic encryption,” M.S. thesis, Dept. Comm. Eng., National Chiao Tung Univ., Hsinchu, Taiwan, 2011.
[15]R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” in Commun. of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
[16]S. Goldwasser and S. Micali, “Probabilistic encryption and how to play mental poker keeping secret all partial information,” in STOC '82 Proc. 14th Annu. ACM Symp. on Theory of Computing, New York, NY, 1982, pp. 365–377.
[17]J. Benaloh, “Dense probabilistic encryption,” in Proc. Workshop on Select. Areas of Cryptography, Berlin, Germany, 1994, pp. 120–128.
[18]P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology — EUROCRYPT ’99, vol. 1592, 1999, pp. 223–238.
[19]J. Li et al., “A simple fully homomorphic encryption scheme available in cloud computing,” in Cloud Computing and Intelligent Syst., vol. 1, Hangzhou, China, 2012, pp. 214–217.
[20]Z. Brakerski and V. Vaikuntanathan, “Efficient fully homomorphic encryption from (Standard) LWE,” SIAM J. Comput., vol. 43, no. 2, pp. 831–871, Mar. 2014.
[21]G. Paul and S. Maitra, RC4 stream cipher and its variants, Boca Raton: CRC Press, 2011.
[22]R. Rivest, “The MD4 message digest algorithm,” in Advances in Cryptology– CRYPTO’92, Tokyo, Japan: Springer, 1991, pp. 303–311.
[23]R. Rivest, “The MD5 message-digest algorithm”, RFC 1321, Apr. 1992.
[24]D. Eastlake and P. Jones, “US secure Hash algorithm 1(SHA1)”, IETF Request for Comments 3174, 2001.
[25]C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, pp. 379–423, Apr. 1948.
[26]W. Diffie and M. E. Hellman, “New directions in cryptography.” IEEE Trans. Inf. Theory, vol. 22, pp. 644–654, Jan. 1976.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top