基於全同態加密的可驗證外包計算研究

dc.contributor紀博文zh_TW
dc.contributorChi, Po-Wenen_US
dc.contributor.author陳柏諺zh_TW
dc.contributor.authorChen, Po-Yenen_US
dc.date.accessioned2025-12-09T08:19:09Z
dc.date.available2025-08-07
dc.date.issued2025
dc.description.abstract全同態加密技術在隱私保護領域中占有關鍵地位,尤其是在雲端運算或運算外包等場景中。該技術允許使用者在加密資料上進行所需的計算。然而,由於所有計算都是在加密狀態下完成的,資料提供者在不解密計算過程的情況下,難以驗證運算方是否對計算結果進行了篡改。雖然已有一些研究者針對此問題提出了解決方案,但這些方法通常會導致客戶端在初始化或驗證階段耗費過多的運算資源與時間,而且某些方法可能並不具備通用性。因此,我們設計了一種可驗證的全同態加密機制,以確保資料提供者能夠輕鬆驗證運算方是否對計算過程進行了篡改。此外,該機制亦旨在盡可能降低資料提供者的運算負擔。zh_TW
dc.description.abstractFully Homomorphic encryption technology holds a pivotal position in the field of privacy protection, especially in scenarios such as cloud computing or computational outsourcing. This technology allows users to perform necessary computations on encrypted data. However, since all computations are performed under encryption, data providers find it challenging to verify whether the computing party has tampered with the computation results without decrypting the process. Although some researchers have already designed solutions for this problem, these methods usually cause the client to consume excessive computational resources and time during the setup or verification phase, and there is also the possibility that some methods may not be universally applicable. Therefore, we design a verifiable fully homomorphic encryption mechanism to ensure that data providers can easily verify whether the computing party has tampered with the computation process. Furthermore, it aims to minimize the computational load on the data provider as much as possible.en_US
dc.description.sponsorship資訊工程學系zh_TW
dc.identifier61047077S-48068
dc.identifier.urihttps://etds.lib.ntnu.edu.tw/thesis/detail/19b0b4fc1d938e0dae9ccc7010f4ec12/
dc.identifier.urihttp://rportal.lib.ntnu.edu.tw/handle/20.500.12235/125791
dc.language英文
dc.subject全同態加密zh_TW
dc.subject可驗證外包計算zh_TW
dc.subjectFully Homomorphic Encryptionen_US
dc.subjectVerifiable Outsourcing Computationen_US
dc.title基於全同態加密的可驗證外包計算研究zh_TW
dc.titleA Study of Verifiable Outsourcing Computation Based onFully Homomorphic Encryptionen_US
dc.type學術論文

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
202500048068-110477.pdf
Size:
1.12 MB
Format:
Adobe Portable Document Format
Description:
學術論文

Collections