TY - GEN
T1 - Entangled encodings and data entanglement
AU - Ateniese, Giuseppe
AU - Dagdelen, Özgür
AU - Damgård, Ivan
AU - Venturi, Daniele
N1 - Publisher Copyright:
© 2015 ACM.
PY - 2015/4/14
Y1 - 2015/4/14
N2 - We introduce a new cryptographic tool that we dub entangled encoding scheme. An entangled encoding allows a set of users to encode their files into a single digital "clew" such that the following two properties are satisfied. (1) Privacy: The resulting encoding reveals no information about the files contained inside the clew; (2) All-or-nothing integrity (AONI): It is impossible to modify or delete any significant part of the encoding without affecting all files contained in the clew. We provide a concrete instantiation of an entangled encoding scheme with unconditional security, based on polynomial interpolation over a finite field. Finally, we show an appealing application of entangled encodings to the setting of secure cloud storage, where a set of users store their files at a potentially malicious cloud provider and want to ensure that their data remain safe and unblemished.
AB - We introduce a new cryptographic tool that we dub entangled encoding scheme. An entangled encoding allows a set of users to encode their files into a single digital "clew" such that the following two properties are satisfied. (1) Privacy: The resulting encoding reveals no information about the files contained inside the clew; (2) All-or-nothing integrity (AONI): It is impossible to modify or delete any significant part of the encoding without affecting all files contained in the clew. We provide a concrete instantiation of an entangled encoding scheme with unconditional security, based on polynomial interpolation over a finite field. Finally, we show an appealing application of entangled encodings to the setting of secure cloud storage, where a set of users store their files at a potentially malicious cloud provider and want to ensure that their data remain safe and unblemished.
KW - Cloud storage
KW - Data entanglement
KW - Secure computation
UR - http://www.scopus.com/inward/record.url?scp=84959310213&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959310213&partnerID=8YFLogxK
U2 - 10.1145/2732516.2732524
DO - 10.1145/2732516.2732524
M3 - Conference contribution
AN - SCOPUS:84959310213
T3 - SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015
SP - 3
EP - 12
BT - SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015
T2 - 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015
Y2 - 14 April 2015
ER -