You are looking at a specific version 20150923:064424 of this paper. See the latest version.

Paper 2015/920

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage

Giuseppe Ateniese and Antonio Faonio and Seny Kamara

Abstract

We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. The 15th IMA International Conference on Cryptography and Coding, IMACC 2015, St. Catherine’s College, University of Oxford, UK
Keywords
identification protocolszero knowledgeRSA
Contact author(s)
afaonio @ gmail com; ateniese @ gmail com; senyk @ microsoft com;
History
2015-09-23: revised
2015-09-22: received
See all versions
Short URL
https://ia.cr/2015/920
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.