[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-642-10366-7_19guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Proofs of Storage from Homomorphic Identification Protocols

Published: 02 December 2009 Publication History

Abstract

Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication schemes where `tags' on multiple messages can be homomorphically combined to yield a `tag' on any linear combination of these messages.
We provide a framework for building public-key HLAs from any identification protocol satisfying certain homomorphic properties. We then show how to turn any public-key HLA into a publicly-verifiable PoS with communication complexity independent of the file length and supporting an unbounded number of verifications. We illustrate the use of our transformations by applying them to a variant of an identification protocol by Shoup, thus obtaining the first unbounded-use PoS based on factoring (in the random oracle model).

References

[1]
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACMConference on Computer and Communications Security. ACM, New York (2007)
[2]
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. 4th Intl. Conf. on Security and Privacy in Communication Netowrks (SecureComm 2008), pp. 1-10. ACM, New York (2008)
[3]
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
[4]
Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Technical Report 2008/175, Cryptology ePrint Archive (2008)
[5]
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
[6]
Erway, C., Papamanthou, C., Kupcu, A., Tamassia, R.: Dynamic provable data possession. In: ACM Conf. on Computer and Communications Security (to appear, 2009). Available as Cryptology ePrint Archive, Report 2008/432
[7]
Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. J. Cryptology 1(2), 77-94 (1988)
[8]
Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for NP. J. Cryptology 9(3), 167-190 (1996)
[9]
Groth, J.: A verifiable secret shuffle of homomorphic encryptions. Technical Report 2005/246, IACR ePrint Cryptography Archive (2005)
[10]
Guillou, L., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123-128. Springer, Heidelberg (1988)
[11]
Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security. ACM, New York (2007)
[12]
Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. Cryptology 16(3), 143-184 (2003)
[13]
Naor, M., Rothblum, G.: The complexity of online memory checking. In: IEEE Symposium on Foundations of Computer Science, pp. 573-584. IEEE Computer Society, Los Alamitos (2005)
[14]
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008), Full version http://eprint.iacr.org
[15]
Shoup, V.: On the security of a practical identification scheme. J. Cryptology 12(4), 247-260 (1999)

Cited By

View all
  • (2024)Public Auditing with Aggregated Tags for Multiple UsersData Security and Privacy Protection10.1007/978-981-97-8546-9_7(122-139)Online publication date: 25-Oct-2024
  • (2023)Cost-effective Data Upkeep in Decentralized Storage SystemsProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577728(165-173)Online publication date: 27-Mar-2023
  • (2023)Unleashing Trustworthy Cloud Storage: Harnessing Blockchain for Cloud Data Integrity VerificationAdvances in Visual Informatics10.1007/978-981-99-7339-2_37(443-452)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ASIACRYPT '09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
December 2009
720 pages
ISBN:9783642103650
  • Editor:
  • Mitsuru Matsui

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 02 December 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Public Auditing with Aggregated Tags for Multiple UsersData Security and Privacy Protection10.1007/978-981-97-8546-9_7(122-139)Online publication date: 25-Oct-2024
  • (2023)Cost-effective Data Upkeep in Decentralized Storage SystemsProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577728(165-173)Online publication date: 27-Mar-2023
  • (2023)Unleashing Trustworthy Cloud Storage: Harnessing Blockchain for Cloud Data Integrity VerificationAdvances in Visual Informatics10.1007/978-981-99-7339-2_37(443-452)Online publication date: 15-Nov-2023
  • (2021)Linearly Homomorphic Signatures with Designated CombinerProvable and Practical Security10.1007/978-3-030-90402-9_18(327-345)Online publication date: 5-Nov-2021
  • (2020)Generic Dynamic Data Outsourcing Framework for Integrity VerificationACM Computing Surveys10.1145/336599853:1(1-32)Online publication date: 6-Feb-2020
  • (2019)Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL TreeInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201901011011:1(126-137)Online publication date: 1-Jan-2019
  • (2019)Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.266221616:1(72-83)Online publication date: 1-Jan-2019
  • (2019)A more efficient leveled strongly-unforgeable fully homomorphic signature schemeInformation Sciences: an International Journal10.1016/j.ins.2018.12.025480:C(70-89)Online publication date: 1-Apr-2019
  • (2019)Privacy-Preserving Certificateless Cloud Auditing with Multiple UsersWireless Personal Communications: An International Journal10.1007/s11277-019-06208-1106:3(1161-1182)Online publication date: 1-Jun-2019
  • (2019)An alternative approach to public cloud data auditing supporting data dynamicsSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-3155-423:13(4939-4953)Online publication date: 1-Jul-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media