Compact Proofs of Retrievability

被引:322
作者
Shacham, Hovav [1 ]
Waters, Brent [2 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
SECURITY;
D O I
10.1007/s00145-012-9129-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build systems that are both efficient and provably secure-that is, it should be possible to extract the client's data from any prover that passes a verification check. In this paper, we give the first proof-of-retrievability schemes with full proofs of security against arbitrary adversaries in the strongest model, that of Juels and Kaliski. Our first scheme, built from BLS signatures and secure in the random oracle model, features a proof-of-retrievability protocol in which the client's query and server's response are both extremely short. This scheme allows public verifiability: anyone can act as a verifier, not just the file owner. Our second scheme, which builds on pseudorandom functions (PRFs) and is secure in the standard model, allows only private verification. It features a proof-of-retrievability protocol with an even shorter server's response than our first scheme, but the client's query is long. Both schemes rely on homomorphic properties to aggregate a proof into one small authenticator value.
引用
收藏
页码:442 / 483
页数:42
相关论文
共 31 条
[1]  
Aigner M., 2004, PROOFS BOOK
[2]   A linear time erasure-resilient code with nearly optimal recovery [J].
Alon, N ;
Luby, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (06) :1732-1736
[3]  
[Anonymous], 2011, A Sample of Samplers: A Computational Perspective on Sampling, DOI [DOI 10.1007/978-3-642-22670-0_24, 10.1007/978-3-642-22670-0_24]
[4]  
[Anonymous], 2006, 2006150 CRYPT EPRINT
[5]  
[Anonymous], 2008, TECHNICAL REPORTS
[6]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[7]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[8]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[9]  
Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
[10]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403