SELECTED APPLICATIONS OF MPC

File
Publisher
Florida Atlantic University
Date Issued
2022
EDTF Date Created
2022
Description
Secure multiparty computation (secure MPC) is a computational paradigm that enables a group of parties to evaluate a public function on their private data without revealing the data (i.e., by preserving the privacy of their data). This computational approach, sometimes also referred to as secure function evaluation (SFE) and privacy-preserving computation, has attracted significant attention in the last couple of decades. It has been studied in different application domains, including in privacy-preserving data mining and machine learning, secure signal processing, secure genome analysis, sealed-bid auctions, etc. There are different approaches for realizing secure MPC. Some commonly used approaches include secret sharing schemes, Yao's garbled circuits, and homomorphic encryption techniques.
The main focus of this dissertation is to further investigate secure multiparty computation as an appealing area of research and to study its applications in different domains. We specifically focus on secure multiparty computation based on secret sharing and fully homomorphic encryption (FHE) schemes. We review the important theoretical foundations of these approaches and provide some novel applications for each of them. For the fully homomorphic encryption (FHE) part, we mainly focus on FHE schemes based on the LWE problem [142] or RLWE problem [109]. Particularly, we provide a C++ implementation for the ring variant of a third generation FHE scheme called the approximate eigenvector method (a.k.a., the GSW scheme) [67]. We then propose some novel approaches for homomorphic evaluation of common functionalities based on the implemented (R)LWE [142] and [109] and RGSW [38,58] schemes. We specifically present some constructions for homomorphic computation of pseudorandom functions (PRFs). For secure computation based on secret sharing [150], we provide some novel protocols for secure trust evaluation (STE). Our proposed STE techniques [137] enable the parties in trust and reputation systems (TRS) to securely assess their trust values in each other while they keep their input trust values private. It is worth mentioning that trust and reputation are social mechanisms which can be considered as soft security measures that complement hard security measures (e.g., cryptographic and secure multiparty computation techniques) [138, 171].
Note

Includes bibliography.

Language
Type
Extent
114 p.
Identifier
FA00014018
Rights

Copyright © is held by the author with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.

Additional Information
Includes bibliography.
Dissertation (Ph.D.)--Florida Atlantic University, 2022.
FAU Electronic Theses and Dissertations Collection
Date Backup
2022
Date Created Backup
2022
Date Text
2022
Date Created (EDTF)
2022
Date Issued (EDTF)
2022
Extension


FAU

IID
FA00014018
Person Preferred Name

Ghaseminejad, Mohammad Raeini

author

Graduate College
Physical Description

application/pdf
114 p.
Title Plain
SELECTED APPLICATIONS OF MPC
Use and Reproduction
Copyright © is held by the author with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.
http://rightsstatements.org/vocab/InC/1.0/
Origin Information

2022
2022
Florida Atlantic University

Boca Raton, Fla.

Place

Boca Raton, Fla.
Title
SELECTED APPLICATIONS OF MPC
Other Title Info

SELECTED APPLICATIONS OF MPC