IACR News item: 22 September 2015
Giuseppe Ateniese, Antonio Faonio, Seny Kamara
ePrint Report
We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any
zero-knowledge PoS to a leakage-resilient ID protocol in the BRM.
We then describe a ZK-PoS based on RSA which, under our transformation,
yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.
Additional news items may be found on the IACR news page.