cryptographic proofs for remote storage models and
play

Cryptographic proofs for remote storage: models and construction - PowerPoint PPT Presentation

Cryptographic proofs for remote storage: models and construction Julien Lavauzelle 1 , Franoise Levy-dit-Vehel 1,2 1 LIX & INRIA Saclay, Universit Paris-Saclay 2 ENSTA ParisTech Journes codage & cryptographie 2018, Aussois, France


  1. Cryptographic proofs for remote storage: models and construction Julien Lavauzelle 1 , Françoise Levy-dit-Vehel 1,2 1 LIX & INRIA Saclay, Université Paris-Saclay 2 ENSTA ParisTech Journées codage & cryptographie 2018, Aussois, France 12/10/2018

  2. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 1/17

  3. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 1/17

  4. Informal issue Checking storage properties on remote servers , e.g. verifying that: ◮ the server actually stores the file, ◮ the server has fully deleted some data, ◮ a file is retrievable from the server, ◮ some space is used/available on a server. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 2/17

  5. Informal issue Checking storage properties on remote servers , e.g. verifying that: ◮ the server actually stores the file, ◮ the server has fully deleted some data, ◮ a file is retrievable from the server, ◮ some space is used/available on a server. Practical application: ◮ cryptocurrency based on a decentralized cloud storage network ◮ Storj, FileCoin, SpaceMint. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 2/17

  6. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  7. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  8. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  9. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) : u ∈ Q} Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  10. PoR and PDP Proof of Retrievability (PoR): 1 a verifier checks extractability of a file m . Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , (most of) w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) : u ∈ Q} Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) A Proof of Data Possession (PDP) is essentially a PoR without explicit extractor. 1 introduced in PoRs: Proofs of Retrievability for Large Files , Juels, Kaliski CCS’07 J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 3/17

  11. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  12. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] Proving that some space/time is invested: ◮ Proof of Space (PoS) [ Proofs of Space , Dziembowski, Faust, Kolmogorov, Pietrzak, CRYPTO’15] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  13. Other proofs for remote storage Proving deletion of data : ◮ Proof of Secure Erasure (PoSE) 2 [ One-time computable self-erasing functions , Dziembowski, Kazan, Wichs TCC’11] Proving that some space/time is invested: ◮ Proof of Space (PoS) [ Proofs of Space , Dziembowski, Faust, Kolmogorov, Pietrzak, CRYPTO’15] Proving robust storage: ◮ Proof of replication (PoReP) , e.g. in FileCoin ◮ With public audit: public incompressible encodings (PIE) [Cecchetti, Miers, Juels, IACR eprint’18] 2 originally introduced by Perito and Tsudik, Secure code update for embedded devices via proofs of secure erasure (ESORICS 2010) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  14. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  15. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 4/17

  16. Formal definitions for PoRs Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) } Extraction m / ⊥ ← Extract ( { ( u , r u ) : u ∈ Q} , κ ) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 5/17

  17. Formal definitions for PoRs Verifier Prover κ ← KeyGen ( 1 λ ) w ← Init ( m , κ ) Initialisation w delete m , w u ← R Q u r u r u ← Resp ( u , w ) Verification 0/1 ← Check ( u , r u , κ ) { ( u , r u ) } Extraction m / ⊥ ← Extract ( r , κ ) Hypothesis (following [Paterson, Stinson, Upadhyay, J. Math. Crypto.’13]): response algorithm Resp is non-adaptive and deterministic. ⇒ One can consider the response word r = ( r u : u ∈ Q ) J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 5/17

  18. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  19. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . Soundness. A PoR is ( ε , τ ) -sound if for every prover r ,  �  m ← R M Extract ( r , κ ) � = m � � κ ← R KeyGen ( 1 λ )  �   ≤ τ . Pr and  �  w ← Init ( m , κ )  � succ ( r , κ ) ≥ 1 − ε � r ← Resp ( · , w ) � J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  20. Security model For some response word r and secret data κ , we define the success : succ ( r , κ ) : = Pr u ← R Q ( Check ( u , r u , κ ) = 1 ) . Soundness. A PoR is ( ε , τ ) -sound if for every prover r ,  �  m ← R M Extract ( r , κ ) � = m � � κ ← R KeyGen ( 1 λ )  �   ≤ τ . Pr and  �  w ← Init ( m , κ )  � succ ( r , κ ) ≥ 1 − ε � r ← Resp ( · , w ) � Goal: τ ≪ 1, for constant ε > 0. J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  21. 1. Proofs-of-* for secure remote storage 2. A generic construction of proof-of-retrievability Model and definition A generic construction of PoR Some instances J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 6/17

  22. Outline Our main goals ◮ sublinear communication complexity for the verification ◮ low additional storage ◮ few computation during the verification step ( e.g. Resp and Check ) ◮ analysable/quantifiable soundness J. Lavauzelle — Cryptographic proofs for remote storage: models and construction JC2 2018 7/17

Recommend


More recommend