Paper 2014/364
Deleting Secret Data with Public Verifiability
Feng Hao, Dylan Clarke, and Avelino Francisco Zorzo
Abstract
Existing software-based data erasure programs can be summarized as following the same one-bit-return protocol: the deletion program performs data erasure and returns either success or failure. However, such a one-bit-return protocol turns the data deletion system into a black box -- the user has to trust the outcome but cannot easily verify it. This is especially problematic when the deletion program is encapsulated within a Trusted Platform Module (TPM), and the user has no access to the code inside. In this paper, we present a cryptographic solution that aims to make the data deletion process more transparent and verifiable. In contrast to the conventional black/white assumptions about TPM (i.e., either completely trust or distrust), we introduce a third assumption that sits in between: namely, ``trust-but-verify''. Our solution enables a user to verify the correct implementation of two important operations inside a TPM without accessing its source code: i.e., the correct encryption of data and the faithful deletion of the key. Finally, we present a proof-of-concept implementation of the SSE system on a resource-constrained Java card to demonstrate its practical feasibility. To our knowledge, this is the first systematic solution to the secure data deletion problem based on a ``trust-but-verify'' paradigm, together with a concrete prototype implementation.
Note: Updated to be consistent with the camera-ready paper to be published by IEEE TDSC.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- key managementsmart cardszero knowledgesecure data deletion
- Contact author(s)
- haofeng66 @ gmail com
- History
- 2015-04-14: revised
- 2014-05-25: received
- See all versions
- Short URL
- https://ia.cr/2014/364
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/364, author = {Feng Hao and Dylan Clarke and Avelino Francisco Zorzo}, title = {Deleting Secret Data with Public Verifiability}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/364}, year = {2014}, url = {https://eprint.iacr.org/2014/364} }