Implementation of entropically secure encryption: Securing personal health data

被引:0
|
作者
Temel, Mehmet Huseyin [1 ]
Skoric, Boris [2 ]
Monroy, Idelfonso Tafur [1 ]
机构
[1] Eindhoven Univ Technol, Elect Engn Dept, Eindhoven, Netherlands
[2] Eindhoven Univ Technol, Math & Comp Sci Dept, Eindhoven, Netherlands
关键词
cryptography; entropy; Galois fields; private key cryptography; quantum cryptography; security of data;
D O I
10.1049/ell2.70065
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Entropically secure encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. Here, the first implementation of ESE for bulk encryption is presented. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. A polynomial multiplication is implemented based on the gf2x library, with modifications that avoid inputs of vastly different length, thus improving speed. Additionally, a recently proposed efficient reduction algorithm that works for any polynomial degree is implemented. Two use cases are investigated: x-ray images of patients and human genome data. Entropy estimation is conducted using compression methods whose results determine the key lengths required for ESE. The running times for all steps of the encryption are reported. The potential of ESE to be used in conjunction with quantum key distribution (QKD), in order to achieve full information-theoretic security of QKD-protected links for these use cases is discussed.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (06) : 45 - 51+77
  • [22] Secure data aggregation with multiple encryption
    Onen, Melek
    Molva, Refik
    WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2007, 4373 : 117 - +
  • [23] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [24] A Novel Chaotic Encryption Framework for Securing Palmprint Data
    Bhatnagar, Gaurav
    Wu, Q. M. Jonathan
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 442 - 449
  • [25] Securing Data in Image Using Advanced Encryption Standard
    Chavan, Puja
    Pagar, Aditya
    Pote, Sanket
    Fulsundar, Avdhoot
    Ghante, Piyush
    Mane, Phinehas
    Sonawane, Raj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 411 - 419
  • [26] Securing data over cloud - enhanced hybrid data encryption algorithm
    Mahapatra, Prasanta Kumar
    Tripathy, Alok Ranjan
    Tripathy, Alakananda
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (05): : 991 - 1011
  • [27] SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION
    Manjutha, M.
    Kumar, Arun K.
    Sri, Subha, V
    Dharshana, Shree D.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 81 - 92
  • [28] A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 255 - 262
  • [29] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Li, Ming
    Yu, Shucheng
    Zheng, Yao
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 131 - 143
  • [30] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033