Investigation of unconditionally secure multi-party computation
Cianciullo, Louis (2022) Investigation of unconditionally secure multi-party computation. PhD thesis, James Cook University.
|
PDF (Thesis)
Download (943kB) | Preview |
Abstract
Louis Cianciullo conducted an in-depth study of the cryptographic field of multi-party computation. He created a variety of different, novel cryptographic algorithms that improved upon the efficiency and security of exiting protocols. His work aims to advance the state-of-the-art in privacy preserving technologies.
Item ID: | 77979 |
---|---|
Item Type: | Thesis (PhD) |
Keywords: | multi-party computation (MPC), cryptography, cryptographic algorithms, cryptographic protocols, privacy preserving technologies, individual privacy, secret sharing, polynomial evaluation (OPE) |
Related URLs: | |
Copyright Information: | Copyright © 2022 Louis Cianciullo. |
Additional Information: | Five publications arising from this thesis are stored in ResearchOnline@JCU, at the time of processing. Please see the Related URLs. The publications are: [Chapter 2] Cianciullo, Louis, and Ghodosi, Hossein (2018) Improvements to almost optimum secret sharing with cheating detection. In: Lecture Notes in Computer Science (11049) pp. 193-205. From: IWSEC: 13th International Workshop on Security, 3-5 September 2018, Sendai, Japan. [Chapter 3] Cianciullo, Louis, and Ghodosi, Hossein (2021) Outsourced cheating detection for secret sharing. International Journal of Information Security, 20. pp. 871-878. [Chapter 4] Cianciullo, Louis, and Ghodosi, Hossein (2019) Unconditionally secure distributed oblivious polynomial evaluation. In: Lecture Notes in Computer Science (11396) pp. 132-142. From: Information Security and Cryptology – ICISC 2018, 28-30 November 2018, Seoul, South Korea. [Chapter 5] Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458. [Chapter 6] Cianciullo, Louis, and Ghodosi, Hossein (2019) Efficient information theoretic multi-party computation from oblivious linear evaluation. In: Lecture Notes in Computer Science (11469) pp. 78-90. From: Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, 10 - 11 December 2018, Brussels, Belgium. |
Projects and Grants: | Australian Government Research Training Program Scholarship (RTP) |
Date Deposited: | 28 Mar 2023 05:29 |
FoR Codes: | 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 50% 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy @ 50% |
SEO Codes: | 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 100% |
Downloads: |
Total: 59 Last 12 Months: 6 |
More Statistics |