Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.

IACR Cryptology ePrint Archive(2015)

引用 11|浏览121
暂无评分
摘要
We provide a framework for constructing leakage-resilient identification ID protocols in the bounded retrieval model BRM from proofs of storage PoS that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA in the ROM. The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
更多
查看译文
关键词
Leakage resilience, Bounded retrieval model, Proof of storage, Identification scheme, Generic transformation, RSA security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要