Implementation of entropically secure encryption: Securing personal health data

被引:0
|
作者
Temel, Mehmet Huseyin [1 ]
Skoric, Boris [2 ]
Monroy, Idelfonso Tafur [1 ]
机构
[1] Eindhoven Univ Technol, Elect Engn Dept, Eindhoven, Netherlands
[2] Eindhoven Univ Technol, Math & Comp Sci Dept, Eindhoven, Netherlands
关键词
cryptography; entropy; Galois fields; private key cryptography; quantum cryptography; security of data;
D O I
10.1049/ell2.70065
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Entropically secure encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. Here, the first implementation of ESE for bulk encryption is presented. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. A polynomial multiplication is implemented based on the gf2x library, with modifications that avoid inputs of vastly different length, thus improving speed. Additionally, a recently proposed efficient reduction algorithm that works for any polynomial degree is implemented. Two use cases are investigated: x-ray images of patients and human genome data. Entropy estimation is conducted using compression methods whose results determine the key lengths required for ESE. The running times for all steps of the encryption are reported. The potential of ESE to be used in conjunction with quantum key distribution (QKD), in order to achieve full information-theoretic security of QKD-protected links for these use cases is discussed.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Password-based encryption approach for securing sensitive data
    Mustacoglu, Ahmet F.
    Catak, Ferhat O.
    Fox, Geoffrey C.
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [42] Searchable Encryption with Pattern Matching for Securing Data on Cloud Server
    Pramanick, Neha
    Ali, Syed Taqi
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [43] Securing IoT Healthcare Data: The Power of Blockchain and Homomorphic Encryption
    Sathishkumar, M.
    Raghavendran, V
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 309 - 314
  • [44] Rubik's Cube Encryption for Securing Cloud Stored Data
    Anusree, T. T.
    Swaraj, K. P.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 679 - 685
  • [45] Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments
    Ssembatya, Richard
    Kayem, Anne V. D. M.
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 411 - 416
  • [46] A Blockchain-based Architecture Framework for Secure Sharing of Personal Health Data
    Amofa, Sandro
    Sifah, Emmanuel Boateng
    Agyekum, Kwame O-B Obour
    Abla, Smahi
    Xia, Qi
    Gee, James C.
    Gao, Jianbin
    2018 IEEE 20TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2018,
  • [47] Secure Remote Data Collection System Using Data Encryption
    Rodrigues, Bruno
    Cardoso, Alberto
    Bernardino, Jorge
    Simoes, Nuno
    Marques, Jose
    IFAC PAPERSONLINE, 2019, 52 (27): : 400 - 405
  • [48] An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data
    Reddy N.C.S.
    Madhuravani B.
    Sneha D.P.
    SN Computer Science, 2020, 1 (3)
  • [49] Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption
    Murguia, Carlos
    Farokhi, Farhad
    Shames, Iman
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3950 - 3957
  • [50] Secure Digital Rights Management in Gamified Personal Health Promotion Applications Using Attribute-Based Encryption
    Hsu, Chien-Lung
    Lin, Liang-Shiun
    Lin, Wei-Qian
    Hsu, Tzu-Liang
    ELECTRONICS, 2024, 13 (24):