Back to Search Start Over

Proofs of Retrievability via Fountain Code

Authors :
Sumanta Sarkar
Reihaneh Safavi-Naini
Source :
Foundations and Practice of Security ISBN: 9783642371189, FPS
Publication Year :
2013
Publisher :
Springer Berlin Heidelberg, 2013.

Abstract

Proofs of Retrievability (PoR) allows a client (verifier) to store a file at an untrusted remote storage, and later be able to check the integrity of the file through an interactive challenge-response protocol. A challenge specifies a random subset of blocks and the response is a function of the challenged block. An unbounded-use PoR scheme allows an arbitrary number of challenge-response interactions. Efficient PoR schemes must minimize the communication complexity of the challenge-response protocol, the storage overhead and computation of response by the prover. The security of a PoR scheme is against an erasing adversary and by showing the existence of an extractor which can extract the file from the set of challenges and their corresponding correct responses. In this paper, we modify the unbounded-use PoR scheme of Shacham and Waters (2008) such that the number of challenged data blocks in each round is determined by a probability distribution over a set of possible values. For the security parameter l, the average number of challenged blocks is O(logl), and so is smaller that the original scheme of Shacham and Waters, and in the worst case, is O(l). The response to a challenge is obtained by XORing the challenged data blocks and so is very fast. We show that to ensure security the original verification method of Shacham and Waters must be slightly modified.

Details

ISBN :
978-3-642-37118-9
ISBNs :
9783642371189
Database :
OpenAIRE
Journal :
Foundations and Practice of Security ISBN: 9783642371189, FPS
Accession number :
edsair.doi...........86ce6dfcb6b5bbdaa1e8ab14f976e8cf
Full Text :
https://doi.org/10.1007/978-3-642-37119-6_2