Abstract | ||
---|---|---|
We provide a framework for constructing leakage-resilient identification ID protocols in the bounded retrieval model BRM from proofs of storage PoS that hide partial information about the file. More precisely, we describe a generic transformation from any zero-knowledge PoS to a leakage-resilient ID protocol in the BRM. We then describe a ZK-PoS based on RSA which, under our transformation, yields the first ID protocol in the BRM based on RSA in the ROM. The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-27239-9_19 | IACR Cryptology ePrint Archive |
Field | DocType | Volume |
Identification scheme,Leakage (electronics),Computer science,Leakage resilience,Theoretical computer science,Mathematical proof,Zero-knowledge proof,Bounded function | Journal | 2015 |
Citations | PageRank | References |
3 | 0.41 | 24 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Giuseppe Ateniese | 1 | 4380 | 254.66 |
Antonio Faonio | 2 | 58 | 8.78 |
Seny Kamara | 3 | 1394 | 61.67 |