In this paper, we propose a new type of scheme that we term a proof-of-data-observability scheme. Our definition tries to capture the stronger requirement that the server must have an actual copy of M in its memory space while it executes the challenge-response protocol. We give some examples of schemes that satisfy this new security definition. As well, we analyze the efficiency and security of the protocols we present, and we prove some necessary conditions for the existence of these kinds of protocols.
Category / Keywords: applications / proof-of-retrievability Date: received 24 Sep 2013 Contact author: dstinson at uwaterloo ca Available format(s): PDF | BibTeX Citation Version: 20130926:013335 (All versions of this report) Short URL: ia.cr/2013/614 Discussion forum: Show discussion | Start new discussion