Investigation of unconditionally secure multi-party computation

Cianciullo, Louis (2022) Investigation of unconditionally secure multi-party computation. PhD thesis, James Cook University.

[img]
Preview
PDF (Thesis)
Download (943kB) | Preview
View at Publisher Website: https://doi.org/10.25903/vhy7-d162
 
44


Abstract

Louis Cianciullo conducted an in-depth study of the cryptographic field of multi-party computation. He created a variety of different, novel cryptographic algorithms that improved upon the efficiency and security of exiting protocols. His work aims to advance the state-of-the-art in privacy preserving technologies.

Item ID: 77979
Item Type: Thesis (PhD)
Keywords: multi-party computation (MPC), cryptography, cryptographic algorithms, cryptographic protocols, privacy preserving technologies, individual privacy, secret sharing, polynomial evaluation (OPE)
Related URLs:
Copyright Information: Copyright © 2022 Louis Cianciullo.
Additional Information:

Five publications arising from this thesis are stored in ResearchOnline@JCU, at the time of processing. Please see the Related URLs. The publications are:

[Chapter 2] Cianciullo, Louis, and Ghodosi, Hossein (2018) Improvements to almost optimum secret sharing with cheating detection. In: Lecture Notes in Computer Science (11049) pp. 193-205. From: IWSEC: 13th International Workshop on Security, 3-5 September 2018, Sendai, Japan.

[Chapter 3] Cianciullo, Louis, and Ghodosi, Hossein (2021) Outsourced cheating detection for secret sharing. International Journal of Information Security, 20. pp. 871-878.

[Chapter 4] Cianciullo, Louis, and Ghodosi, Hossein (2019) Unconditionally secure distributed oblivious polynomial evaluation. In: Lecture Notes in Computer Science (11396) pp. 132-142. From: Information Security and Cryptology – ICISC 2018, 28-30 November 2018, Seoul, South Korea.

[Chapter 5] Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

[Chapter 6] Cianciullo, Louis, and Ghodosi, Hossein (2019) Efficient information theoretic multi-party computation from oblivious linear evaluation. In: Lecture Notes in Computer Science (11469) pp. 78-90. From: Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, 10 - 11 December 2018, Brussels, Belgium.

Projects and Grants: Australian Government Research Training Program Scholarship (RTP)
Date Deposited: 28 Mar 2023 05:29
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 50%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy @ 50%
SEO Codes: 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 100%
Downloads: Total: 44
Last 12 Months: 17
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page