Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/151363 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-151363 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1513632021-06-15T05:19:11Z Identity-based key-exposure resilient cloud storage public auditing scheme from lattices Zhang, Xiaojun Wang, Huaxiong Xu, Chunxiang School of Physical and Mathematical Sciences Science::Mathematics Cloud Storage Auditing Key-exposure Resilient With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing key exposure have been proposed. However, they are not secure from quantum attacks, and they rely on public key infrastructure (PKI), which involves complex certificate management. In this paper, we propose an efficient identity-based key-exposure resilient public auditing scheme from lattice assumptions in cloud storage. Our scheme is not only quantum-resistant, but eliminates the need to establish a PKI. We employ lattice basis delegation technique to update a client's private key flexibly, keeping the private key size constant. Based on the hardness of lattice assumptions, we prove the forward security of storage correctness guarantee against malicious cloud servers in detail, and that the proposed scheme preserves privacy against curious auditors. Furthermore, we conduct a performance comparison to demonstrate that our scheme is much more efficient and practical for post-quantum secure cloud storage. This work is supported by National Key R&D Program of China (No.2017YFB0802000), National Natural Science Foundation of China (No.61872060), China Postdoctoral Science Foundation Funded Project (No.2017M623008), Sichuan Science and Technology Program (No. 2018GZ0102), Scientific Research Starting Project of SWPU (No.2017QHZ023), and the State Scholarship Fund of China Scholarship Council (CSC). 2021-06-15T05:19:11Z 2021-06-15T05:19:11Z 2018 Journal Article Zhang, X., Wang, H. & Xu, C. (2018). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223-234. https://dx.doi.org/10.1016/j.ins.2018.09.013 0020-0255 https://hdl.handle.net/10356/151363 10.1016/j.ins.2018.09.013 2-s2.0-85053781097 472 223 234 en Information Sciences © 2018 Elsevier Inc. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics Cloud Storage Auditing Key-exposure Resilient |
spellingShingle |
Science::Mathematics Cloud Storage Auditing Key-exposure Resilient Zhang, Xiaojun Wang, Huaxiong Xu, Chunxiang Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
description |
With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing key exposure have been proposed. However, they are not secure from quantum attacks, and they rely on public key infrastructure (PKI), which involves complex certificate management. In this paper, we propose an efficient identity-based key-exposure resilient public auditing scheme from lattice assumptions in cloud storage. Our scheme is not only quantum-resistant, but eliminates the need to establish a PKI. We employ lattice basis delegation technique to update a client's private key flexibly, keeping the private key size constant. Based on the hardness of lattice assumptions, we prove the forward security of storage correctness guarantee against malicious cloud servers in detail, and that the proposed scheme preserves privacy against curious auditors. Furthermore, we conduct a performance comparison to demonstrate that our scheme is much more efficient and practical for post-quantum secure cloud storage. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Zhang, Xiaojun Wang, Huaxiong Xu, Chunxiang |
format |
Article |
author |
Zhang, Xiaojun Wang, Huaxiong Xu, Chunxiang |
author_sort |
Zhang, Xiaojun |
title |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
title_short |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
title_full |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
title_fullStr |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
title_full_unstemmed |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
title_sort |
identity-based key-exposure resilient cloud storage public auditing scheme from lattices |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/151363 |
_version_ |
1703971246014726144 |