GPN13:SEDAWG: Eine durchsuchbare Verschlüsselung: Unterschied zwischen den Versionen
K (→Slides) |
(fix embed) |
||
(6 dazwischenliegende Versionen von 2 Benutzern werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
Ein Vortrag von AlienX auf der [[GPN13]]. | Ein Vortrag von AlienX auf der [[GPN13]]. | ||
[[File:gpn13-searchable-encryption.mp4|600px|right]] | |||
== Slides == | == Slides == | ||
* The slides are available here: [[Media:GPN13_SEDAWG_Eine_durchsuchbare_Verschlüsselung.pdf|Slides]] [http://cloud.haynberg.de/public.php?service=files&t=8ca096e1ee308ee6ce45afe388daf854 | * The slides are available here: [[Media:GPN13_SEDAWG_Eine_durchsuchbare_Verschlüsselung.pdf|Slides (3.3 MB)]] [http://cloud.haynberg.de/public.php?service=files&t=8ca096e1ee308ee6ce45afe388daf854 mirror] | ||
* As soon as the source code is available online I'll post it here, too. | * As soon as the source code is available online I'll post it here, too. | ||
* Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper. | * Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper. | ||
Zeile 34: | Zeile 33: | ||
perform a search, the user can interact with the server. The server should | perform a search, the user can interact with the server. The server should | ||
never learn neither the string itself, nor the patterns searched for. | never learn neither the string itself, nor the patterns searched for. | ||
== Material == | |||
* Videoaufzeichnung: [http://ftp.ccc.de/events/gpn/gpn13/gpn13-searchable-encryption.mp4 gpn13-searchable-encryption.mp4] ([[Media:gpn13-searchable-encryption.mp4|Mirror]]) | |||
{{Navigationsleiste GPN13}} | {{Navigationsleiste GPN13}} | ||
[[Kategorie:GPN13:Events]] | [[Kategorie:GPN13:Events]] | ||
[[Kategorie:GPN13:Vorträge|SEDAWG: Eine durchsuchbare Verschlüsselung]] |
Aktuelle Version vom 1. Juli 2023, 21:44 Uhr
Ein Vortrag von AlienX auf der GPN13.
Slides
- The slides are available here: Slides (3.3 MB) mirror
- As soon as the source code is available online I'll post it here, too.
- Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper.
Contact details
- @script_alert_1 (Twitter)
- bob at alice and bob dot com (eMail)
- If you are up to code this with performance improvements and in a cool programming language: Contact us!
Abstract
Cloud computing is one of the most promising trends in the IT industry. In terms of data security however, cloud computing brings a new threat: Users lose control over their data. Cloud providers can access their customer's data at will. To challenge this drawback technologically, one needs to seek methods that enhance the privacy of the user's data without negating the advantages of cloud computing. Notably, computational and storage overhead should be handled in the cloud, not on the client. Consider for example the scenario of an outsourced e-mail archive: Users wish to employ a cloud provider to store their e-mails in order to be able to access them with a mobile device and without letting the provider gain knowledge of the archive's content. To conserve bandwidth, they want to perform searches on their archived e-mail online instead of downloading each and every message individually and searching locally. This talk addresses the problem of secure exact pattern matching: A user encrypts a long string he later wishes to query for the occurrence of certain patterns. This encrypted string is then uploaded to a server and to perform a search, the user can interact with the server. The server should never learn neither the string itself, nor the patterns searched for.
Material
- Videoaufzeichnung: gpn13-searchable-encryption.mp4 (Mirror)