Paper 2015/920

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage

Giuseppe Ateniese, Antonio Faonio, and Seny Kamara


We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.

Available format(s)
Public-key cryptography
Publication info
Published elsewhere. MINOR revision.The 15th IMA International Conference on Cryptography and Coding, IMACC 2015, St. Catherine’s College, University of Oxford, UK
identification protocolszero knowledgeRSA
Contact author(s)
afaonio @ gmail com
ateniese @ gmail com
senyk @ microsoft com
2015-09-23: revised
2015-09-22: received
See all versions
Short URL
Creative Commons Attribution


      author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara},
      title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage},
      howpublished = {Cryptology ePrint Archive, Paper 2015/920},
      year = {2015},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.