Proof of retrievability with public verifiability resilient against related-key attacks

被引:16
|
作者
Cui, Hui [1 ]
Mu, Yi [1 ]
Au, Man Ho [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
CHECKING;
D O I
10.1049/iet-ifs.2013.0322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern technologies such as cloud computing, grid computing and software as a service all require data to be stored by the third parties. A specific problem encountered in this context is to convince a verifier that a user's data are kept intact at the storage servers. An important approach to achieve this goal is called proof of retrievability, by which a storage server can assure a verifier via a concise proof that a user's file is available. However, for most publicly verifiable systems, existing proof of retrievability solutions do not take physical attacks into consideration, where an adversary can observe the outcome of the computation with methods like fault injection techniques. In fact, the authors find that giving the adversary the ability to obtain the information about the relations between the private keys, those systems are not secure anymore. Motivated by the need of preventing this kind of attacks, they present the security model for related-key attacks in publicly verifiable proofs of retrievability, where the adversary can subsequently observe the outcome of the publicly verifiable proof of retrievability under the modified key. After pointing out a linear related-key attack on an existing proof of retrievability system with public verifiability, they present a secure and efficient proof of retrievability with public verifiability, against related-key attacks.
引用
收藏
页码:43 / 49
页数:7
相关论文
共 50 条
  • [41] On Related-Key Attacks and KASUMI: The Case of A5/3
    Phuong Ha Nguyen
    Robshaw, Matthew J. B.
    Wang, Huaxiong
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 146 - +
  • [42] On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor
    Phan, RCW
    Handschuh, H
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 111 - 122
  • [43] Revisiting AES related-key differential attacks with constraint programming
    Gerault, David
    Lafourcade, Pascal
    Minier, Marine
    Solnon, Christine
    INFORMATION PROCESSING LETTERS, 2018, 139 : 24 - 29
  • [44] Public Proof of Retrievability Scheme against Active Attack in Cloud Storage
    Zhang, Jianhong
    Tang, Wenjing
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION ENGINEERING, 2014, 111 : 29 - 32
  • [45] Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48
    Lin, Yunxue
    Sun, Ling
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 355 - 377
  • [46] Secure Message Authentication Against Related-Key Attack
    Bhattacharyya, Rishiraj
    Roy, Arnab
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 305 - 324
  • [47] Public key encryption resilient to leakage and tampering attacks
    Sun, Shi-Feng
    Gu, Dawu
    Parampalli, Udaya
    Yu, Yu
    Qin, Baodong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 : 142 - 156
  • [48] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
  • [49] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
  • [50] From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
    Karpman, Pierre
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 177 - 188