Secure Keyless Multi-party Storage Scheme

被引:0
|
作者
Lafourcade, Pascal [1 ]
Mallordy, Lola-Baie [1 ]
Olivier-Anclin, Charles [1 ,2 ,4 ]
Robert, Leo [3 ]
机构
[1] Univ Clermont Auvergne, CNRS, LIMOS, Clermont Ferrand, France
[2] Be Ys Pay, Clermont Ferrand, France
[3] Univ Picardie Jules Verne, Amiens, France
[4] Univ Orleans, INSA Ctr Val Loire, LIFO, Bourges, France
来源
关键词
INFORMATION;
D O I
10.1007/978-3-031-70896-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using threshold secret sharing, we propose a solution tailored for forgetful clients (i.e., not required to keep any cryptographic secret) while accommodating the dynamic nature of multi-cloud deployments. Furthermore, we delegate the computation and distribution of shares to an intermediate server (proxy), effectively minimizing the client workload. We propose two variants of a keyless, space-efficient multi-cloud storage scheme named KAPRE and KAME. Our solution KAPRE requires less communications and computations, while KAME preserves data confidentiality against a colluding proxy. Our protocols offer robust guarantees for data integrity, and we demonstrate the proxy's ability to identify and attribute blame to servers responsible for sending corrupted shares during data reconstruction. We establish a comprehensive security model and provide proofs of the security properties of our protocols. To complement this theoretical analysis, we present a proof-of-concept to illustrate the practical implementation of our proposed scheme.
引用
收藏
页码:279 / 298
页数:20
相关论文
共 50 条
  • [41] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [42] Secure Multi-Party Functional Dependency Discovery
    Ge, Chang
    Ilyas, Ihab F.
    Kerschbaum, Florian
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 13 (02): : 184 - 196
  • [43] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [44] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [45] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [46] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [47] A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY
    Ul Ain, Noor
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 112 - 116
  • [48] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [49] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [50] Fair multi-party concurrent signature scheme
    Ye, Q., 1600, Editorial Board of Journal on Communications (35):