You are looking at a specific version 20150923:064424 of this paper.
See the latest version.
Paper 2015/920
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
Abstract
We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. The 15th IMA International Conference on Cryptography and Coding, IMACC 2015, St. Catherine’s College, University of Oxford, UK
- Keywords
- identification protocolszero knowledgeRSA
- Contact author(s)
- afaonio @ gmail com; ateniese @ gmail com; senyk @ microsoft com;
- History
- 2015-09-23: revised
- 2015-09-22: received
- See all versions
- Short URL
- https://ia.cr/2015/920
- License
-
CC BY