Proofs of retrievability with tag outsourcing based on Goppa codes |
| |
Affiliation: | 1. University of Information and Communication Technology, Thai Nguyen University, Vietnam;2. St. Petersburg Federal Research Center of the Russian Academy of Sciences, St. Petersburg, Russia;3. Institute of Information Technology, Academy of Military Science and Technology, Hanoi, Vietnam;4. Institute of Cryptographic Science and Technology, Hanoi, Vietnam |
| |
Abstract: | In cloud storage, because the data owner loses the physical control of the data, the data may be tampered with or deleted. Although, it has been proposed to adopt provable data possession (PDP) or proofs of retrievability (POR) mechanism to ensure the integrity of cloud storage data. However, at present, most PDP/POR schemes are based on traditional cryptographic mechanisms and cannot resist quantum computer attacks. For this reason, the first POR scheme based on coding mechanism (BC-POR) is proposed in this paper. The scheme is constructed based on the difficulty assumptions of 2-regular word syndrome decoding (2-RWSD) problem and Goppa code distinguishing problem. Moreover, considering the low computing power of lightweight users, this paper adopts an audit scheme that supports the outsourcing of data tag calculation on the client side, that is, the calculation of data tag generation is outsourced to a third-party institution for execution. First of all, this scheme can prevent third-party institution from obtaining the real content of the data in the process of calculation tags and realize the privacy protection of user data. Secondly, the scheme uses a FSB hash function to generate a decodable syndrome, and this algorithm does not require iterative operations during the tagging process, thereby reducing the computational overhead of the tag. Finally, the provable security method is used to prove the security of the proposed scheme, and the performance of the proposed audit scheme is evaluated to prove the effectiveness of the scheme. |
| |
Keywords: | Cloud storage Data integrity Coding Blind signature |
本文献已被 ScienceDirect 等数据库收录! |
|