Presentasjon av hovedoppgaver Sivilingenir IKT 2002 - PowerPoint PPT Presentation

1 / 5
About This Presentation
Title:

Presentasjon av hovedoppgaver Sivilingenir IKT 2002

Description:

Pattern matching : to match patterns between input and data. ... Hash table is used to transform from input pattern to the encrypted data. ... – PowerPoint PPT presentation

Number of Views:34
Avg rating:3.0/5.0
Slides: 6
Provided by: lars95
Category:

less

Transcript and Presenter's Notes

Title: Presentasjon av hovedoppgaver Sivilingenir IKT 2002


1
Presentasjon av hovedoppgaverSivilingeniør
IKT2002
  • Privacy Preserving Pattern Matching
    Implementation Issues

2
Problem Description
  • To secure data with high protection needs that is
    saved in a third place (with encryption).
  • Pattern matching to match patterns between
    input and data. We allow pattern matching without
    revealing information about either data or
    pattern.
  • If one wants to access the data, although one can
    load the data from the database system, one must
    ask decryption to the data owner before being
    able to use the data.

3
Method
4
(No Transcript)
5
Conclusion
  • Hash table is used to transform from input
    pattern to the encrypted data.
  • The implementation with users RSA
    encryption/decryption when the user asks
    decryption to the owner ensures the privacy for
    the user and the data, because even the owner
    doesnt know the data accessed. But it reduces
    the security of the key since the user must use
    the same modulus and phi as the key for the data.
  • The implementation with key agreement doesnt
    ensure the user privacy from the owner because
    the owner knows which data the user accessed, but
    in this case the secret value of the RSA key is
    never distributed.
  • The method is extended on the case of many data
    owners where similar functionality can be
    achieved by using threshold-cryptography.
  • When data belongs to more than one person, the
    implementation divides RSA private key using
    addition (dd1d2), such that the original data
    becomes multiplication of the partial data. It
    needs distribution of modulus (N) because the
    multiplication occurs on the user side.
Write a Comment
User Comments (0)
About PowerShow.com