透過您的圖書館登入
IP:3.137.213.117
  • 學位論文

全同態加密結合雲端金流系統

A Cashflow System on Cloud with Fully Homomorphic Encryption

指導教授 : 劉維正
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著科技的發展,網際網路的普及與許多雲端產品應用,使得雲端平台的服務越來越多。而雲端金流系統就是基於此背景所提出的新興金流服務,讓使用者在有網際網路的情況下,能將傳統銀行所提供的轉帳功能藉由雲端服務實現。然而,當今天銀行想利用委外雲端服務進行數據處理,但是又不希望伺服器能解讀我們的資料內容時,傳統的雲端金流加密系統將無法滿足我們的需求。有鑑於此,本研究提出將全同態加密演算法結合目前的雲端金流系統來解決上述問題。同態加密的概念是當我們對密文進行某種特定運算再將其解密,會等價於相對應的明文之運算結果,這讓我們能直接在密文上進行資料處理並仍能確保資料的正確性,進而達到在雲端運算而不將資料解密的功能。

關鍵字

同態加密

並列摘要


With advances in technological development, as well as the popularity of cloud computing and the Internet, increasing numbers of cloud services have become available. The cash flow system of cloud computing constitutes a new cash flow service based on this large demand, which enables users to transfer funds over the Internet. However, when users want to transfer data to other users’ accounts for processing and do not want the servers to be able to decrypt the data, the traditional cash flow system is inadequate. To solve this problem, we propose to implement fully homomorphic encryption combined with the cash flow system of cloud computing. The concept of homomorphic encryption refers to when we perform a specific operation in ciphertext, the result after decryption is equivalent to the corresponding plaintext. Therefore, utilizing homomorphic encryption allows us to perform data processing in ciphertext, maintain data accuracy, achieve cloud computing, and securely protect the data from decryption.

並列關鍵字

Homomorphic Encryption

參考文獻


[1] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun.of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
[2] T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, pp. 469–472, Jul. 1985.
[3] J. Russel and R. Cohn, Homomorphic encryption, Scotland, United Kingdom: NNX Corp., 2012.
[4] C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP J. on Inform. Security, pp. 1–15, Jan. 2007.
[5] S. Ciou and R. Tso, “A privacy preserved two-party equality testing protocol,” in Genetic and Evol. Computing Conf., Xiamen, China, 2011, pp. 220–223.

延伸閱讀