Paper 2015/920
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese, Antonio Faonio, and Seny Kamara
Abstract
We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. The 15th IMA International Conference on Cryptography and Coding, IMACC 2015, St. Catherine’s College, University of Oxford, UK
- Keywords
- identification protocolszero knowledgeRSA
- Contact author(s)
-
afaonio @ gmail com
ateniese @ gmail com
senyk @ microsoft com - History
- 2015-09-23: revised
- 2015-09-22: received
- See all versions
- Short URL
- https://ia.cr/2015/920
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/920, author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara}, title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/920}, year = {2015}, url = {https://eprint.iacr.org/2015/920} }