International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 22 September 2015

Giuseppe Ateniese, Antonio Faonio, Seny Kamara
ePrint Report ePrint Report
We provide a framework for constructing leakage-resilient identification(ID) protocols in the bounded retrieval model (BRM) from proofs of storage(PoS) that hide partial information about the file. More precisely, we describe a generic transformation from any

zero-knowledge PoS to a leakage-resilient ID protocol in the BRM.

We then describe a ZK-PoS based on RSA which, under our transformation,

yields the first ID protocol in the BRM based on RSA (in the ROM). The resulting protocol relies on a different computational assumption and is more efficient than previously-known constructions.

Expand

Additional news items may be found on the IACR news page.