Title:
On the security and efficiency of encryption

dc.contributor.advisor Boldyreva, Alexandra
dc.contributor.author Cash, Charles David en_US
dc.contributor.committeeMember Ahamad, Mustaque
dc.contributor.committeeMember Randall, Dana
dc.contributor.committeeMember Tetali, Prasad
dc.contributor.committeeMember Traynor, Patrick
dc.contributor.department Computing en_US
dc.date.accessioned 2010-01-29T19:45:38Z
dc.date.available 2010-01-29T19:45:38Z
dc.date.issued 2009-09-24 en_US
dc.description.abstract This thesis is concerned with the design and analysis of practical provably-secure encryption schemes. We give several results that include new schemes with attractive tradeoffs between efficiency and security and new techniques for analyzing existing schemes. Our results are divided into three chapters, which we summarize below. The Twin Diffie-Hellman Problem. We describe techniques for analyzing encryption schemes based on the hardness of Diffie-Hellman-type problems. We apply our techniques to several specific cases of encryption, including identity-based encryption, to design a collection of encryption schemes that offer improved tradeoffs between efficiency and evidence for security over similar schemes. In addition to offering quantitative advantages over prior work in this area, our technique also simplifies security proofs for these types of encryption schemes. Our main tool in this chapter is the notion of Twin Diffie-Hellman Problems, which provide an intermediate step for organizing security reductions and reveal very simple variants of known schemes with correspondingly simple, but non-obvious, analyses. Non-Malleable Hash Functions. We consider security proofs for encryption that are carried out in the random oracle model, where one declares that a scheme's hash functions are ``off limits' for an attacker in order to make a proof go through. Such proofs leave some doubt as to the security of the scheme in practice, when attackers are free to exploit weaknesses in the hash functions. A particular concern is that a scheme may be insecure in practice no matter what very strong security properties its real hash functions satisfy. We address this doubt for an encryption scheme of Bellare and Rogaway by showing that, using appropriately strong hash functions, this scheme's hash functions can be partially instantiated in a secure way. en_US
dc.description.degree Ph.D. en_US
dc.identifier.uri http://hdl.handle.net/1853/31733
dc.publisher Georgia Institute of Technology en_US
dc.subject Provable security en_US
dc.subject Encryption en_US
dc.subject Cryptography en_US
dc.subject.lcsh Data encryption (Computer science)
dc.subject.lcsh Hashing (Computer science)
dc.subject.lcsh Computer security
dc.title On the security and efficiency of encryption en_US
dc.type Text
dc.type.genre Dissertation
dspace.entity.type Publication
local.contributor.advisor Boldyreva, Alexandra
local.contributor.corporatename College of Computing
relation.isAdvisorOfPublication e1b2005b-a2b5-4ebf-962a-82d7f493a7a3
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
cash_charles_d_200912_phd.pdf
Size:
527.98 KB
Format:
Adobe Portable Document Format
Description: