Leakage-resilient identification schemes from zero-knowledge proofs of storage

Giuseppe Ateniese, Antonio Faonio, Seny Kamara

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

We provide a framework for constructing leakage-resilient identification (ID) protocols in the bounded retrieval model (BRM) from proofs of storage (PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.

Original languageEnglish
Title of host publicationCryptography and Coding - 15th IMA International Conference, IMACC 2015, Proceedings
EditorsJens Groth
Pages311-328
Number of pages18
DOIs
StatePublished - 2015
Event15th IMA International Conference on Cryptography and Coding, IMACC 2015 - Oxford, United Kingdom
Duration: 15 Dec 201517 Dec 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9496
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th IMA International Conference on Cryptography and Coding, IMACC 2015
Country/TerritoryUnited Kingdom
CityOxford
Period15/12/1517/12/15

Keywords

  • Bounded retrieval model
  • Generic transformation
  • Identification scheme
  • Leakage resilience
  • Proof of storage
  • RSA security

Fingerprint

Dive into the research topics of 'Leakage-resilient identification schemes from zero-knowledge proofs of storage'. Together they form a unique fingerprint.

Cite this