cryptographic proofs for remote storage models and
play

Cryptographic proofs for remote storage: models and construction - PowerPoint PPT Presentation

Cryptographic proofs for remote storage: models and construction Julien Lavauzelle 1 , Franoise Levy-dit-Vehel 1,2 1 LIX & INRIA Saclay, Universit Paris-Saclay 2 ENSTA ParisTech Journes codage & cryptographie 2018, Aussois, France


  1. Cryptographic proofs for remote storage: models and construction Julien Lavauzelle 1 , Françoise Levy-dit-Vehel 1,2 1 LIX & INRIA Saclay, Université Paris-Saclay 2 ENSTA ParisTech Journées codage & cryptographie 2018, Aussois, France 12/10/2018

  2. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 1/17

  3. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 1/17

  4. Informal issue Checking storage properties on remote servers , e.g. verifying that: ◮ the server actually stores the file, ◮ the server has fully deleted some data, ◮ a file is retrievable from the server, ◮ some space is used/available on a server. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 2/17

  5. Informal issue Checking storage properties on remote servers , e.g. verifying that: ◮ the server actually stores the file, ◮ the server has fully deleted some data, ◮ a file is retrievable from the server, ◮ some space is used/available on a server. Practical application: ◮ cryptocurrency based on a decentralized cloud storage network ◮ Storj, FileCoin, SpaceMint. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 2/17

  6. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  7. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  8. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  9. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) : u ∈ Q} Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  10. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) : u ∈ Q} Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) A Proof of Data Possession (PDP) is essentially a PoR without explicit extractor. 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  11. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  12. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] Proving that some space/time is invested: ◮ Proof of Space (PoS) [ Proofs of Space , Dziembowski, Faust, Kolmogorov, Pietrzak, CRYPTO’15] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  13. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] Proving that some space/time is invested: ◮ Proof of Space (PoS) [ Proofs of Space , Dziembowski, Faust, Kolmogorov, Pietrzak, CRYPTO’15] Proving robust storage: ◮ Proof of replication (PoReP) , e.g. in FileCoin ◮ With public audit: public incompressible encodings (PIE) [Cecchetti, Miers, Juels, IACR eprint’18] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  14. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  15. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  16. Formal definitions for PoRs Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) } Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 5/17

  17. Formal definitions for PoRs Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) } Extraction m / ⊥ ← Extract ( r , κ ) Hypothesis (following [Paterson, Stinson, Upadhyay, J. Math. Crypto.’13]): response algorithm Resp is non-adaptive and deterministic. ⇒ One can consider the response word r = ( r u : u ∈ Q ) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 5/17

  18. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  19. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . Soundness. A PoR is ( ε , τ ) -sound if for every prover r ,  �  m ← R M Extract ( r , κ ) � = m � � κ ← R KeyGen ( 1 λ )  �   ≤ τ . Pr and  �  w ← Init ( m , κ )  � succ ( r , κ ) ≥ 1 − ε � r ← Resp ( · , w ) � J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  20. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . Soundness. A PoR is ( ε , τ ) -sound if for every prover r ,  �  m ← R M Extract ( r , κ ) � = m � � κ ← R KeyGen ( 1 λ )  �   ≤ τ . Pr and  �  w ← Init ( m , κ )  � succ ( r , κ ) ≥ 1 − ε � r ← Resp ( · , w ) � Goal: τ ≪ 1, for constant ε > 0. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  21. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  22. Outline Our main goals ◮ sublinear communication complexity for the verification ◮ low additional storage ◮ few computation during the verification step ( e.g. Resp and Check ) ◮ analysable/quantifiable soundness J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 7/17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend