A new publicly verifiable data possession on remote storage

被引:9
|
作者
Tang, Chun-ming [1 ]
Zhang, Xiao-jun [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud; Public authentication; Verifiable data possession; Integrity; PLAINTEXT-AWARE; ENCRYPTION; SECURE;
D O I
10.1007/s11227-015-1556-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new verifiable data possession construction supporting both private and public verifiability simultaneously is proposed from a linearly homomorphic cryptography method, which allows a server to integrate l selected block-tag pairs into a single block-tag pair as a response to user's query. In our scheme, the data owner who uses the private verification and anyone else who runs the public verification algorithm simultaneously on the same set of meta-data and based on the same setup procedure can securely authenticate the integrity of client's data file stored at cloud server without retrieving the whole original data file. Besides, in fact our simultaneous privately and publicly verifiable scheme can also be adjusted to elliptic curve group. The scheme proposed is efficient on both client and server sides, especially in computation on cloud server side, which is almost optimal among those existing publicly verifiable schemes. Here the server needs not to perform any exponent operations at all, which greatly reduces client's waiting time. Finally, we make the security analysis of our scheme under several cryptographic assumptions, such as difficulty of Factorization Assumption and Discrete Logarithm Problem (DLP).
引用
收藏
页码:77 / 91
页数:15
相关论文
共 50 条
  • [41] Publicly verifiable authenticated encryption
    Wen, HA
    Lo, CM
    Hwang, T
    ELECTRONICS LETTERS, 2003, 39 (19) : 1382 - 1383
  • [42] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [43] Publicly Verifiable Auctions with Privacy
    Germouty, Paul
    Larraia, Enrique
    Zhang, Wei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2023 INTERNATIONAL WORKSHOPS, FC 2023, 2024, 13953 : 420 - 438
  • [44] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [45] Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    Designs, Codes and Cryptography, 2020, 88 : 677 - 709
  • [46] Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
    Song, Wei
    Wang, Bing
    Wang, Qian
    Shi, Chengliang
    Lou, Wenjing
    Peng, Zhiyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2334 - 2347
  • [47] Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (04) : 677 - 709
  • [48] Delegable Provable Data Possession for Remote Data in the Clouds
    Shen, Shiuan-Tzuo
    Tzeng, Wen-Guey
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 93 - 111
  • [49] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [50] A Remote File Possession Checking Protocol in a Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 115 - 121