Secure Dynamic Hourglass Protocol for Untrusted Server
スポンサーリンク
概要
- 論文の詳細を見る
Other than performing integrity verification at untrusted stores, support for data dynamics is a critical component in the construction of Proofs of Data Possession (PDP) schemes for them to achieve practical applications in real life scenarios. We therefore propose the design of a fully dynamic storage protocol that additionally imposes a strong economical incentive to a cloud provider to store data in a particular format as desired by the client. The client or TPA can remotely verify the data an unlimited number of times with the additional capability of supporting data dynamics that includes data insertion, an important component missing in many PDP protocols. In particular, we present a permutation-like hourglass scheme that involves no cryptographic operations and whose security depends on the performance characteristics of the rotational drives and extend this scheme to a fully dynamic PDP scheme whose security analysis is shown to be provably secure and highly efficient.
- 一般社団法人電子情報通信学会の論文
- 2013-09-06
著者
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
-
Ratemo Alice
Japan Advanced Institute of Science and Technology
関連論文
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server