Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhang, Xiaojun, Wang, Huaxiong, Xu, Chunxiang
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/151363
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-151363
record_format dspace
spelling sg-ntu-dr.10356-1513632021-06-15T05:19:11Z Identity-based key-exposure resilient cloud storage public auditing scheme from lattices Zhang, Xiaojun Wang, Huaxiong Xu, Chunxiang School of Physical and Mathematical Sciences Science::Mathematics Cloud Storage Auditing Key-exposure Resilient With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing key exposure have been proposed. However, they are not secure from quantum attacks, and they rely on public key infrastructure (PKI), which involves complex certificate management. In this paper, we propose an efficient identity-based key-exposure resilient public auditing scheme from lattice assumptions in cloud storage. Our scheme is not only quantum-resistant, but eliminates the need to establish a PKI. We employ lattice basis delegation technique to update a client's private key flexibly, keeping the private key size constant. Based on the hardness of lattice assumptions, we prove the forward security of storage correctness guarantee against malicious cloud servers in detail, and that the proposed scheme preserves privacy against curious auditors. Furthermore, we conduct a performance comparison to demonstrate that our scheme is much more efficient and practical for post-quantum secure cloud storage. This work is supported by National Key R&D Program of China (No.2017YFB0802000), National Natural Science Foundation of China (No.61872060), China Postdoctoral Science Foundation Funded Project (No.2017M623008), Sichuan Science and Technology Program (No. 2018GZ0102), Scientific Research Starting Project of SWPU (No.2017QHZ023), and the State Scholarship Fund of China Scholarship Council (CSC). 2021-06-15T05:19:11Z 2021-06-15T05:19:11Z 2018 Journal Article Zhang, X., Wang, H. & Xu, C. (2018). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223-234. https://dx.doi.org/10.1016/j.ins.2018.09.013 0020-0255 https://hdl.handle.net/10356/151363 10.1016/j.ins.2018.09.013 2-s2.0-85053781097 472 223 234 en Information Sciences © 2018 Elsevier Inc. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics
Cloud Storage Auditing
Key-exposure Resilient
spellingShingle Science::Mathematics
Cloud Storage Auditing
Key-exposure Resilient
Zhang, Xiaojun
Wang, Huaxiong
Xu, Chunxiang
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
description With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing key exposure have been proposed. However, they are not secure from quantum attacks, and they rely on public key infrastructure (PKI), which involves complex certificate management. In this paper, we propose an efficient identity-based key-exposure resilient public auditing scheme from lattice assumptions in cloud storage. Our scheme is not only quantum-resistant, but eliminates the need to establish a PKI. We employ lattice basis delegation technique to update a client's private key flexibly, keeping the private key size constant. Based on the hardness of lattice assumptions, we prove the forward security of storage correctness guarantee against malicious cloud servers in detail, and that the proposed scheme preserves privacy against curious auditors. Furthermore, we conduct a performance comparison to demonstrate that our scheme is much more efficient and practical for post-quantum secure cloud storage.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Zhang, Xiaojun
Wang, Huaxiong
Xu, Chunxiang
format Article
author Zhang, Xiaojun
Wang, Huaxiong
Xu, Chunxiang
author_sort Zhang, Xiaojun
title Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
title_short Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
title_full Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
title_fullStr Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
title_full_unstemmed Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
title_sort identity-based key-exposure resilient cloud storage public auditing scheme from lattices
publishDate 2021
url https://hdl.handle.net/10356/151363
_version_ 1703971246014726144