TY - GEN
T1 - Proofs of storage from homomorphic identification protocols
AU - Ateniese, Giuseppe
AU - Kamara, Seny
AU - Katz, Jonathan
PY - 2009
Y1 - 2009
N2 - Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication schemes where 'tags' on multiple messages can be homomorphically combined to yield a 'tag' on any linear combination of these messages. We provide a framework for building public-key HLAs from any identification protocol satisfying certain homomorphic properties. We then show how to turn any public-key HLA into a publicly-verifiable PoS with communication complexity independent of the file length and supporting an unbounded number of verifications. We illustrate the use of our transformations by applying them to a variant of an identification protocol by Shoup, thus obtaining the first unbounded-use PoS based on factoring (in the random oracle model).
AB - Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication schemes where 'tags' on multiple messages can be homomorphically combined to yield a 'tag' on any linear combination of these messages. We provide a framework for building public-key HLAs from any identification protocol satisfying certain homomorphic properties. We then show how to turn any public-key HLA into a publicly-verifiable PoS with communication complexity independent of the file length and supporting an unbounded number of verifications. We illustrate the use of our transformations by applying them to a variant of an identification protocol by Shoup, thus obtaining the first unbounded-use PoS based on factoring (in the random oracle model).
UR - http://www.scopus.com/inward/record.url?scp=72449185582&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=72449185582&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-10366-7_19
DO - 10.1007/978-3-642-10366-7_19
M3 - Conference contribution
AN - SCOPUS:72449185582
SN - 3642103650
SN - 9783642103650
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 319
EP - 333
BT - Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
T2 - 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009
Y2 - 6 December 2009 through 10 December 2009
ER -