University Sétif 1 FERHAT ABBAS Faculty of Sciences
Détail de l'auteur
Auteur Abd El Krim Sekhri Zeggar |
Documents disponibles écrits par cet auteur
Ajouter le résultat dans votre panier Affiner la rechercheBenchmarking of Threshold Symmetric Encryption Schemes: Performance Analysis and Limitations / Abd El Krim Sekhri Zeggar
Titre : Benchmarking of Threshold Symmetric Encryption Schemes: Performance Analysis and Limitations Type de document : document électronique Auteurs : Abd El Krim Sekhri Zeggar ; Zibouda Aliouat, Directeur de thèse Editeur : Setif:UFA Année de publication : 2025 Importance : 1 vol (22 f .) Format : 29 cm Langues : Anglais (eng) Catégories : Thèses & Mémoires:Informatique Mots-clés : Distributed Symmetric-key Encryption (DiSE)
Amortized Threshold Symmetric-key Encryption (ATSE)
Central processing unit (CPU)Index. décimale : 004 Informatique Résumé :
This study explores the practical implementation and integration of two advanced
threshold symmetric-key encryption frameworks: Distributed Symmetric-key Encryption
(DiSE) and Amortized Threshold Symmetric-key Encryption (ATSE). By distributing
cryptographic operations across multiple parties, both schemes ensure that
secret keys remain never fully reconstructed, thereby enhancing security in collaborative
environments. DiSE introduces a robust distributed architecture for symmetric
encryption, while ATSE optimizes computational efficiency over repeated operations
through amortization techniques. This project evaluates their performance focusing on
latency and throughput. The experiments were done on a local machine simulating a
distributed scheme where each of the CPU thread representing a node. Further more
the experiment was setup while simulating a 10ms network delay to fully align with
the papers work. The results achieved were for a small number of nodes while providing
more metrics measurements than the papers all while trying minor modifications
to discover the advantages and limitations of each algorithm while maintaining the
original idea.Note de contenu : Sommaire
Abstract i
Table of contents vii
Abbreviations viii
Introduction 1
1 Background review and methodology 2
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 The Risk of Centralized Key Management . . . . . . . . . . . . 3
1.1.3 How Threshold Encryption Mitigates This Risk . . . . . . . . . 3
1.1.4 Research Objectives . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.1 Threshold Symmetric-Key Encryption . . . . . . . . . . . . . . 4
1.2.2 Key Security Properties . . . . . . . . . . . . . . . . . . . . . . 5
1.2.3 Existing schemes . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.4 Indentified Gaps . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3.1 Scheme Selection Criteria . . . . . . . . . . . . . . . . . . . . . 7
1.3.2 Development Environment . . . . . . . . . . . . . . . . . . . . . 8
1.3.3 Parameter and Configuration (n,t) . . . . . . . . . . . . . . . . 10
1.3.4 Metrics Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.3.5 Measurement Procedure . . . . . . . . . . . . . . . . . . . . . . 10
2 Implementation, Results and Discussion 11
2.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.1 Code Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.2 Key Considerations . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.3 How the Logic Works . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2.1 The Obtained Results . . . . . . . . . . . . . . . . . . . . . . . 12
2.3 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.3.1 The Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.3.2 Advantages and Disadvantages of Each Scheme . . . . . . . . . 16
2.3.3 Appropriate Use cases . . . . . . . . . . . . . . . . . . . . . . . 16
Conclusion and Future Work 18
Bibliography 20Côte titre : MAI/1046 Benchmarking of Threshold Symmetric Encryption Schemes: Performance Analysis and Limitations [document électronique] / Abd El Krim Sekhri Zeggar ; Zibouda Aliouat, Directeur de thèse . - [S.l.] : Setif:UFA, 2025 . - 1 vol (22 f .) ; 29 cm.
Langues : Anglais (eng)
Catégories : Thèses & Mémoires:Informatique Mots-clés : Distributed Symmetric-key Encryption (DiSE)
Amortized Threshold Symmetric-key Encryption (ATSE)
Central processing unit (CPU)Index. décimale : 004 Informatique Résumé :
This study explores the practical implementation and integration of two advanced
threshold symmetric-key encryption frameworks: Distributed Symmetric-key Encryption
(DiSE) and Amortized Threshold Symmetric-key Encryption (ATSE). By distributing
cryptographic operations across multiple parties, both schemes ensure that
secret keys remain never fully reconstructed, thereby enhancing security in collaborative
environments. DiSE introduces a robust distributed architecture for symmetric
encryption, while ATSE optimizes computational efficiency over repeated operations
through amortization techniques. This project evaluates their performance focusing on
latency and throughput. The experiments were done on a local machine simulating a
distributed scheme where each of the CPU thread representing a node. Further more
the experiment was setup while simulating a 10ms network delay to fully align with
the papers work. The results achieved were for a small number of nodes while providing
more metrics measurements than the papers all while trying minor modifications
to discover the advantages and limitations of each algorithm while maintaining the
original idea.Note de contenu : Sommaire
Abstract i
Table of contents vii
Abbreviations viii
Introduction 1
1 Background review and methodology 2
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 The Risk of Centralized Key Management . . . . . . . . . . . . 3
1.1.3 How Threshold Encryption Mitigates This Risk . . . . . . . . . 3
1.1.4 Research Objectives . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.1 Threshold Symmetric-Key Encryption . . . . . . . . . . . . . . 4
1.2.2 Key Security Properties . . . . . . . . . . . . . . . . . . . . . . 5
1.2.3 Existing schemes . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.4 Indentified Gaps . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3.1 Scheme Selection Criteria . . . . . . . . . . . . . . . . . . . . . 7
1.3.2 Development Environment . . . . . . . . . . . . . . . . . . . . . 8
1.3.3 Parameter and Configuration (n,t) . . . . . . . . . . . . . . . . 10
1.3.4 Metrics Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.3.5 Measurement Procedure . . . . . . . . . . . . . . . . . . . . . . 10
2 Implementation, Results and Discussion 11
2.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.1 Code Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.2 Key Considerations . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.3 How the Logic Works . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2.1 The Obtained Results . . . . . . . . . . . . . . . . . . . . . . . 12
2.3 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.3.1 The Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.3.2 Advantages and Disadvantages of Each Scheme . . . . . . . . . 16
2.3.3 Appropriate Use cases . . . . . . . . . . . . . . . . . . . . . . . 16
Conclusion and Future Work 18
Bibliography 20Côte titre : MAI/1046 Exemplaires (1)
Code-barres Cote Support Localisation Section Disponibilité MAI/1046 MAI/1046 Mémoire Bibliothèque des sciences Anglais Disponible
Disponible

