Paper 2015/920

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage

Giuseppe Ateniese, Antonio Faonio, and Seny Kamara

Abstract

We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. The 15th IMA International Conference on Cryptography and Coding, IMACC 2015, St. Catherine’s College, University of Oxford, UK
Keywords
identification protocolszero knowledgeRSA
Contact author(s)
afaonio @ gmail com
ateniese @ gmail com
senyk @ microsoft com
History
2015-09-23: revised
2015-09-22: received
See all versions
Short URL
https://ia.cr/2015/920
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/920,
      author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara},
      title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage},
      howpublished = {Cryptology ePrint Archive, Paper 2015/920},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/920}},
      url = {https://eprint.iacr.org/2015/920}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.