TY - GEN
T1 - Leakage-resilient identification schemes from zero-knowledge proofs of storage
AU - Ateniese, Giuseppe
AU - Faonio, Antonio
AU - Kamara, Seny
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - We provide a framework for constructing leakage-resilient identification (ID) protocols in the bounded retrieval model (BRM) from proofs of storage (PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
AB - We provide a framework for constructing leakage-resilient identification (ID) protocols in the bounded retrieval model (BRM) from proofs of storage (PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
KW - Bounded retrieval model
KW - Generic transformation
KW - Identification scheme
KW - Leakage resilience
KW - Proof of storage
KW - RSA security
UR - http://www.scopus.com/inward/record.url?scp=84951873931&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84951873931&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-27239-9_19
DO - 10.1007/978-3-319-27239-9_19
M3 - Conference contribution
AN - SCOPUS:84951873931
SN - 9783319272382
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 311
EP - 328
BT - Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Proceedings
A2 - Groth, Jens
T2 - 15th IMA International Conference on Cryptography and Coding, IMACC 2015
Y2 - 15 December 2015 through 17 December 2015
ER -