Secure Keyless Multi-party Storage Scheme

被引:0
|
作者
Lafourcade, Pascal [1 ]
Mallordy, Lola-Baie [1 ]
Olivier-Anclin, Charles [1 ,2 ,4 ]
Robert, Leo [3 ]
机构
[1] Univ Clermont Auvergne, CNRS, LIMOS, Clermont Ferrand, France
[2] Be Ys Pay, Clermont Ferrand, France
[3] Univ Picardie Jules Verne, Amiens, France
[4] Univ Orleans, INSA Ctr Val Loire, LIFO, Bourges, France
来源
关键词
INFORMATION;
D O I
10.1007/978-3-031-70896-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using threshold secret sharing, we propose a solution tailored for forgetful clients (i.e., not required to keep any cryptographic secret) while accommodating the dynamic nature of multi-cloud deployments. Furthermore, we delegate the computation and distribution of shares to an intermediate server (proxy), effectively minimizing the client workload. We propose two variants of a keyless, space-efficient multi-cloud storage scheme named KAPRE and KAME. Our solution KAPRE requires less communications and computations, while KAME preserves data confidentiality against a colluding proxy. Our protocols offer robust guarantees for data integrity, and we demonstrate the proxy's ability to identify and attribute blame to servers responsible for sending corrupted shares during data reconstruction. We establish a comprehensive security model and provide proofs of the security properties of our protocols. To complement this theoretical analysis, we present a proof-of-concept to illustrate the practical implementation of our proposed scheme.
引用
收藏
页码:279 / 298
页数:20
相关论文
共 50 条
  • [1] Unconditionally secure multi-party quantum commitment scheme
    Wang, Ming-Qiang
    Wang, Xue
    Zhan, Tao
    QUANTUM INFORMATION PROCESSING, 2018, 17 (02)
  • [2] Unconditionally secure multi-party quantum commitment scheme
    Ming-Qiang Wang
    Xue Wang
    Tao Zhan
    Quantum Information Processing, 2018, 17
  • [3] A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation
    Liu W.
    Guan Y.
    Huo J.
    Ding Y.
    Guo H.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1218 - 1229
  • [4] A Secure Multi-party Signature Scheme Based on Trust Mechanism
    Cheng, Yage
    Hu, Mingsheng
    Wang, Lipeng
    Lei, Yanfang
    Fu, Junjun
    Gong, Bei
    Ma, Wei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 119 - 132
  • [5] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [6] Secure Multi-party Computation Scheme of Shared Energy Storage Index Based on Blockchain Environment
    Jiang, Xinyue
    Li, Leyi
    Qiu, Weiqiang
    Pei, You
    Tao, Yibin
    Lin, Zhenzhi
    2021 IEEE IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA (IEEE I&CPS ASIA 2021), 2021, : 586 - 591
  • [7] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [8] A secure delegation scheme of large polynomial computation in multi-party cloud
    Guo, Shu
    Xu, Haixia
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (01) : 1 - 7
  • [9] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
  • [10] SMAP: A Joint Dimensionality Reduction Scheme for Secure Multi-Party Visualization
    Xia, Jiazhi
    Chen, Tianxiang
    Zhang, Lei
    Chen, Wei
    Chen, Yang
    Zhang, Xiaolong
    Xie, Cong
    Schreck, Tobias
    2020 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST 2020), 2020, : 107 - 118