Skip to main content

2016 | OriginalPaper | Buchkapitel

7. A Detailed View on SecureString 3.0

verfasst von : Günter Fahrnberger

Erschienen in: Advances in Computing Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

These days, vicious globally playing enterprises and various culprits try to exploit individuals’ sensitive data whenever opportunities arise. Public clouds and private users with low (or even no) security awareness facilitate such malefactions. On account of this, a rational data owner’s trust in public clouds should reach the level semi-honest or semi-honest-but-curious at best due to their uncertainty of the location(s) of their data respectively of undesired access on them. The homomorphic cryptosystem SecureString 3.0 remedies to recapture the cloud users’ faith in secure cloud computing on encrypted character strings by combining the paradigms blind computing and secret sharing. While existing literature already covers the principles of SecureString 3.0, herein, the adduced implementation details of this cryptosystem given in pseudocode allow researchers to realize their own prototypes and practitioners to integrate SecureString 3.0 in their own security solutions. Decent security and performance analyses prove the applicability of this cryptosystem in the field, e.g., for secure instant messaging sifters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdalla M, Bellare M (2000) Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques. In: OkamotoT (ed) Advances in Cryptology ASIACRYPT 2000. Lecture notes in computer science, vol. 1976. Springer, Berlin, Heidelberg, pp 546–559. https://dx.doi.org/10.1007/3-540-44448-3_42 Abdalla M, Bellare M (2000) Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques. In: OkamotoT (ed) Advances in Cryptology ASIACRYPT 2000. Lecture notes in computer science, vol. 1976. Springer, Berlin, Heidelberg, pp 546–559. https://​dx.​doi.​org/​10.​1007/​3-540-44448-3_​42
11.
Zurück zum Zitat Fahrnberger G (2015) Repetition pattern attack on multi-word-containing securestring 2.0 objects. In: Natarajan R, Barua G, Patra MR (eds) Distributed computing and internet technology. Lecture notes in computer science, vol 8956. Springer International Publishing, pp 265–277. https://dx.doi.org/10.1007/978-3-319-14977-6_26 Fahrnberger G (2015) Repetition pattern attack on multi-word-containing securestring 2.0 objects. In: Natarajan R, Barua G, Patra MR (eds) Distributed computing and internet technology. Lecture notes in computer science, vol 8956. Springer International Publishing, pp 265–277. https://​dx.​doi.​org/​10.​1007/​978-3-319-14977-6_​26
12.
Zurück zum Zitat Fahrnberger G, Heneis K (2015) Securestring 3.0—a cryptosystem for blind computing on encrypted character strings. In: Natarajan R, Barua G, Patra MR (eds) Distributed computing and internet technology. Lecture notes in computer science, vol 8956. Springer International Publishing, pp 331–334. https://dx.doi.org/10.1007/978-3-319-14977-6_33 Fahrnberger G, Heneis K (2015) Securestring 3.0—a cryptosystem for blind computing on encrypted character strings. In: Natarajan R, Barua G, Patra MR (eds) Distributed computing and internet technology. Lecture notes in computer science, vol 8956. Springer International Publishing, pp 331–334. https://​dx.​doi.​org/​10.​1007/​978-3-319-14977-6_​33
14.
Zurück zum Zitat Ferguson N, Schneier B (2003) Practical cryptography. Wiley Ferguson N, Schneier B (2003) Practical cryptography. Wiley
17.
Zurück zum Zitat Halang WA, Komkhao M, Sodsee S (2014) Secure cloud computing. In: Boonkrong S, Unger H, Meesad P (eds) Recent advances in information and communication technology. Advances in intelligent systems and computing, vol 265, May 2014. Springer International Publishing, pp 305–314. https://dx.doi.org/10.1007/978-3-319-06538-0_30 Halang WA, Komkhao M, Sodsee S (2014) Secure cloud computing. In: Boonkrong S, Unger H, Meesad P (eds) Recent advances in information and communication technology. Advances in intelligent systems and computing, vol 265, May 2014. Springer International Publishing, pp 305–314. https://​dx.​doi.​org/​10.​1007/​978-3-319-06538-0_​30
24.
Zurück zum Zitat Petit C, Standaert FX, Pereira O, Malkin TG, Yung M (2008) A block cipher based pseudo random number generator secure against side-channel key recovery. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. ASIACCS’08, ACM, New York, NY, USA, pp 56–65. https://dx.doi.org/10.1145/1368310.1368322 Petit C, Standaert FX, Pereira O, Malkin TG, Yung M (2008) A block cipher based pseudo random number generator secure against side-channel key recovery. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. ASIACCS’08, ACM, New York, NY, USA, pp 56–65. https://​dx.​doi.​org/​10.​1145/​1368310.​1368322
Metadaten
Titel
A Detailed View on SecureString 3.0
verfasst von
Günter Fahrnberger
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2630-0_7