Security Through an Intra-layer Optimization

  • Krentz K
  • Meinel C
  • Graupner H
ISSN: 03029743
N/ACitations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

Proofs of Retrievability (PoR) allows a client (verifier) to store a file at an untrusted remote storage, and later be able to check the integrity of the file through an interactive challenge-response protocol. A challenge specifies a random subset of blocks and the response is a function of the challenged block. An unbounded-use PoR scheme allows an arbitrary number of challenge-response interactions. Efficient PoR schemes must minimize the communication complexity of the challenge-response protocol, the storage overhead and computation of response by the prover. The security of a PoR scheme is against an erasing adversary and by showing the existence of an extractor which can extract the file from the set of challenges and their corresponding correct responses. In this paper, we modify the unbounded-use PoR scheme of Shacham and Waters (2008) such that the number of challenged data blocks in each round is determined by a probability distribution over a set of possible values. For the security parameter l, the average number of challenged blocks is O(logl), and so is smaller that the original scheme of Shacham and Waters, and in the worst case, is O(l). The response to a challenge is obtained by XORing the challenged data blocks and so is very fast. We show that to ensure security the original verification method of Shacham and Waters must be slightly modified. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Krentz, K., Meinel, C., & Graupner, H. (2018). Security Through an Intra-layer Optimization. Foundations and Practice of Security (Vol. 1, pp. 173–188). Springer International Publishing. Retrieved from http://dx.doi.org/10.1007/978-3-319-75650-9_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free