National Repository of Grey Literature 13 records found  previous11 - 13  jump to record: Search took 0.01 seconds. 
Homomorphic encryption schemes
Titěrová, Anežka ; Kazda, Alexandr (advisor) ; Hojsík, Michal (referee)
Title: Homomorphic encryption schemes Author: Anežka Titěrová Department: Department of Algebra Supervisor: RNDr. Alexandr Kazda, Department of Algebra Abstract: Rivest et al. posed in 1978 the cryptographic problem how to correctly compute arbitrary functions over encrypted data without direct decrypting. This problem is solved by using of a fully homomorphic encryp- tion scheme, which was discovered and first described by Craig Gentry in 2009. This work gives a summary of contemporary knowledge in this field. The attention will be restricted to a general overview how to construct the fully homomorphic encryption scheme with respect to the information security. The results will be applied in an implementation of a somewhat homomorphic encryption scheme as a computer program. Fully homomorphic encryption schemes have abundant applications, especi- ally in secure cloud computing. Nevertheless, the greatest challenge for scien- tists is finding out more efficient algorithm because existing implementations are not as effective and fast as required for everyday use. Keywords: homomorphic encryption, fully homomorphic encryption scheme, lattice cryptography, logic circuit
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Data security on operation systems
Konečný, Jakub ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is focused on comparing data security options on various desktop operating systems, user authetication and provided cryptography API for developers. The thesis includes a design and realization of an application for secure data storage by using the selective database encryption.

National Repository of Grey Literature : 13 records found   previous11 - 13  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.