期刊论文详细信息
Journal of mathematical cryptology
Is extracting data the same as possessing data?
article
Douglas R. Stinson1  Jalaj Upadhyay1 
[1] David R. Cheriton School of Computer Science, University of Waterloo
关键词: Proof-of-retrievability;    proof-of-data-observability;   
DOI  :  10.1515/jmc-2013-0034
学科分类:社会科学、人文和艺术(综合)
来源: De Gruyter
PDF
【 摘 要 】

Abstract. Proof-of-retrievability schemes have been a topic of considerable recent interest. In these schemes, a client ?$\mathsf {C}$ gives a file M to a server ?$\mathsf {S}$ with the understanding that ?$\mathsf {S}$ will securely store M . A suitable challenge-response protocol is invoked by ?$\mathsf {C}$ in order for ?$\mathsf {C}$ to gain confidence that M is indeed being correctly stored by ?$\mathsf {S}$. The definition of proof-of-retrievability schemes is based on the notion of an extractor ℰ$\mathcal {E}$ that can recover the file once the challenge-response protocol is executed a sufficient number of times. In this paper, we propose a new type of scheme that we term a proof-of-data-observability scheme . Our definition tries to capture the stronger requirement that ?$\mathsf {S}$ must have an actual copy of M in its memory space while it executes the challenge-response protocol. We give some examples of schemes that satisfy this new security definition. As well, we analyze the efficiency and security of the protocols we present, and we prove some necessary conditions for the existence of these kinds of protocols.

【 授权许可】

CC BY|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202107200005290ZK.pdf 240KB PDF download
  文献评价指标  
  下载次数:0次 浏览次数:0次