Proof of retrievability with public verifiability resilient against related-key attacks

被引:16
|
作者
Cui, Hui [1 ]
Mu, Yi [1 ]
Au, Man Ho [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
CHECKING;
D O I
10.1049/iet-ifs.2013.0322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern technologies such as cloud computing, grid computing and software as a service all require data to be stored by the third parties. A specific problem encountered in this context is to convince a verifier that a user's data are kept intact at the storage servers. An important approach to achieve this goal is called proof of retrievability, by which a storage server can assure a verifier via a concise proof that a user's file is available. However, for most publicly verifiable systems, existing proof of retrievability solutions do not take physical attacks into consideration, where an adversary can observe the outcome of the computation with methods like fault injection techniques. In fact, the authors find that giving the adversary the ability to obtain the information about the relations between the private keys, those systems are not secure anymore. Motivated by the need of preventing this kind of attacks, they present the security model for related-key attacks in publicly verifiable proofs of retrievability, where the adversary can subsequently observe the outcome of the publicly verifiable proof of retrievability under the modified key. After pointing out a linear related-key attack on an existing proof of retrievability system with public verifiability, they present a secure and efficient proof of retrievability with public verifiability, against related-key attacks.
引用
收藏
页码:43 / 49
页数:7
相关论文
共 50 条
  • [1] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [2] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [3] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [4] Homomorphic Authentication Scheme for Proof of Retrievability with Public Verifiability
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 1017 - 1022
  • [5] Ciphers secure against related-key attacks
    Lucks, S
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
  • [6] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [7] Anonymous Signcryption against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
  • [8] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [9] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Hu, Chengyu
    Liu, Pengtao
    Guo, Shanqing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 681 - 692
  • [10] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692