Homomorphic linear authentication schemes from ε-ASU 2 functions for proofs of retrievability

S. Liu,K. Chem
2012-01-01
Abstract:Proof of Retrievability (POR) refers to interactive auditing protocols executed between a storage server and clients, so that clients can be convinced that their data is available at the stor- age server, ready to be retrieved when needed. In an interactive POR protocol, clients initiate challenges to the server, and the server feed- backs responses to clients with the help of the stored data. Retriev- ability means that it should be possible for a client to extract his/her data from the server's valid responses. An essential step leading to retrievability is the server's unforgeability of valid responses, i.e, any server coming up with valid responses to a client's challenges is ac- tually storing the client's data with overwhelming probability. Un- forgeability can be achieved with authentication schemes like MAC, Digital Signature, etc. With Homomorphic Linear Authentication (HLA) schemes, the server's several responses can be aggregated into one, hence reducing the communication complexity. In this paper, we explore some new constructions of ǫ-almost strong universal hash- ing functions (ǫ-ASU2), which are used to build homomorphic linear authenticator schemes in POR to provide unforgeability. We show the HLA scheme involved in Shacham and Waters' POR scheme (see Shacham and Waters, 2008) is just an employment of a class ǫ-ASU2 functions. Using another class of ǫ-ASU2 for authentication in POR results in a new HLA scheme, which enjoys unforgability, the same shortest responses as the SW scheme, but reduces the local storage from O(n+s) to O(n) for information soundness, and from O(s) to O(1) for knowledge-soundness.
What problem does this paper attempt to address?