Implementation of entropically secure encryption: Securing personal health data

被引:0
|
作者
Temel, Mehmet Huseyin [1 ]
Skoric, Boris [2 ]
Monroy, Idelfonso Tafur [1 ]
机构
[1] Eindhoven Univ Technol, Elect Engn Dept, Eindhoven, Netherlands
[2] Eindhoven Univ Technol, Math & Comp Sci Dept, Eindhoven, Netherlands
关键词
cryptography; entropy; Galois fields; private key cryptography; quantum cryptography; security of data;
D O I
10.1049/ell2.70065
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Entropically secure encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. Here, the first implementation of ESE for bulk encryption is presented. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. A polynomial multiplication is implemented based on the gf2x library, with modifications that avoid inputs of vastly different length, thus improving speed. Additionally, a recently proposed efficient reduction algorithm that works for any polynomial degree is implemented. Two use cases are investigated: x-ray images of patients and human genome data. Entropy estimation is conducted using compression methods whose results determine the key lengths required for ESE. The running times for all steps of the encryption are reported. The potential of ESE to be used in conjunction with quantum key distribution (QKD), in order to achieve full information-theoretic security of QKD-protected links for these use cases is discussed.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Entropically secure encryption with faster key expansion
    Temel, Mehmet Huseyin
    Skoric, Boris
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [2] Entropically secure encryption with faster key expansion
    Mehmet Hüseyin Temel
    Boris Škorić
    Quantum Information Processing, 23
  • [3] Attribute Based Encryption for Securing Personal Health Record on Cloud
    Gondkar, Deepali A.
    Kadam, V. S.
    2014 2ND INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS), 2014,
  • [4] Implementation of A Blockchain-based Searchable Encryption for Securing Contact Tracing Data
    Ng, Zheng Yao
    Salam, Iftekhar
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (02): : 241 - 254
  • [5] Securing Personal Health Record System in Cloud Using User Usage Based Encryption
    Suresh, Dhina
    Florence, M. Lilly
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (06)
  • [6] Securing Personal Health Record System in Cloud Using User Usage Based Encryption
    Dhina Suresh
    M. Lilly Florence
    Journal of Medical Systems, 2019, 43
  • [7] A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud
    Sethi, Kamalakanta
    Majumdar, Amartya
    Bera, Padmalochan
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [8] A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing
    Priyanka Rajan Kumar
    Sonia Goel
    Scientific Reports, 15 (1)
  • [9] Secure sharing of personal health records in Jelastic cloud by Attribute based encryption
    Maheswari, S.
    Gudla, Upendra
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [10] Facilitating Secure Sharing of Personal Health Data in the Cloud
    Thilakanathan, Danan
    Calvo, Rafael A.
    Chen, Shiping
    Nepal, Surya
    Glozier, Nick
    JMIR MEDICAL INFORMATICS, 2016, 4 (02) : 56 - 73