z-logo
Premium
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model
Author(s) -
Miao Meixia,
Tian Guohua,
Susilo Willy
Publication year - 2021
Publication title -
international journal of intelligent systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.291
H-Index - 87
eISSN - 1098-111X
pISSN - 0884-8173
DOI - 10.1002/int.22400
Subject(s) - computer science , mathematical proof , hash function , data deduplication , gas meter prover , merkle tree , theoretical computer science , protocol (science) , adversary , overhead (engineering) , computer security , cryptographic hash function , mathematics , programming language , medicine , geometry , alternative medicine , pathology
The primitive of proofs of ownership (PoWs) enables a prover to efficiently convince a verifier that he/she indeed owns a certain message in a knowledge‐proof manner. As a result, it can prevent an adversary who only has a short information of the message from accessing the whole one. We argue that the existing PoWs based on Merkle hash tree and specific encodings are not much efficient if the size of message is sufficiently huge. In this paper, we first propose a new PoW protocol based on the chameleon hash function without key exposure. Interestingly, it is equivalent to having the prover compute a new collision of chameleon hashing as the proof in our construction. Therefore, the proposed protocol is much efficient since the computation and storage overhead of proof is independent of the size of the message. Moreover, we utilize the proposed PoWs to design a deduplication scheme over ciphertext.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here