• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Compact Proofs of Retrievability (2008)

Cached

  • Download as a PDF

Download Links

  • [eprint.iacr.org]
  • [www.ssrc.ucsc.edu]
  • [www.cse.ucsd.edu]
  • [cs.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www.cse.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [eprint.iacr.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Hovav Shacham , Brent Waters
Citations:196 - 0 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Shacham08compactproofs,
    author = {Hovav Shacham and Brent Waters},
    title = {Compact Proofs of Retrievability},
    year = {2008}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client’s data. The central challenge is to build systems that are both efficient and provably secure — that is, it should be possible to extract the client’s data from any prover that passes a verification check. All previous provably secure solutions require that a prover send O(l) authenticator values (i.e., MACs or signatures) to verify a file, for a total of O(l 2) bits of communication, where l is the security parameter. The extra cost over the ideal O(l) communication can be prohibitive in systems where a verifier needs to check many files. We create the first compact and provably secure proof of retrievability systems. Our solutions allow for compact proofs with just one authenticator value — in practice this can lead to proofs with as little as 40 bytes of communication. We present two solutions with similar structure. The first one is privately verifiable and builds elegantly on pseudorandom functions (PRFs); the second allows for publicly verifiable proofs and is built from the signature scheme of Boneh, Lynn, and Shacham in bilinear groups. Both solutions rely on homomorphic properties to aggregate a proof into one small authenticator value. 1

Keyphrases

compact proof    client data    authenticator value    signature scheme    second allows    central challenge    similar structure    security parameter    secure proof    prover send    bilinear group    many file    first compact    data storage center    extra cost    proof-of-retrievability system    homomorphic property    secure solution    verifiable proof    small authenticator value    pseudorandom function    verification check    retrievability system   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University