Deleting Secret Data with Public Verifiability
read more
Citations
Blockchain-based publicly verifiable data deletion scheme for cloud storage
Provable data transfer from provable data possession and deletion in cloud storage
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
Toward Assured Data Deletion in Cloud Storage
References
How to prove yourself: practical solutions to identification and signature problems
Cryptography: Theory and Practice
Security Engineering: A Guide to Building Dependable Distributed Systems
Plutus: Scalable Secure File Sharing on Untrusted Storage
Helios: web-based open-audit voting
Related Papers (5)
Frequently Asked Questions (9)
Q2. What are the future works in "Deleting secret data with public verifiability" ?
Future work includes extending the “ trust-butverify ” paradigm to other crypto primitives, in particular, the secure random number generator. The problem of permitting end users to audit if a random number has been generated correctly in a TPM as part of the encryption process ( or a cryptographic protocol ) is still largely unsolved and deserves further research. Java cards can be purchased from various sources, e. g., [ 41 ], [ 42 ].
Q3. Why is it necessary to feed in the entire encrypted message into the audit function input?
Because of the use of a key-confirmation string, it is unnecessary to feed in the entire encrypted message (i.e., EAuthkη (m)) into the audit function input.
Q4. How many random EC pairs can be created?
Given that the Java card that the authors use has 80 KB EEPROM in total and that the SSE program takes up 16 KB storage in EEPROM, the authors can create about 650 random EC public/private pairs.
Q5. What can a user do to gain access to the protected memory?
In one attack, the user can do as a data thief would do: 1) compromising the tamper resistance to gain access to the TPM’s protected memory; 2) recovering the overwritten key value in the protected memory in the TPM.
Q6. What is the first method of deleting a key?
The first method is to simply save the key on the disk, alongside the encrypted data (typically as part of the meta data in the file header) [17], [20], [25], [26].
Q7. How do the authors assume the user erases the keys?
before the system falls into the enemy hands, the authors assume that the user erases keys by calling the Delete function, or in the extreme case, physically destroying the TPM chip.
Q8. How many user instances can be created?
As an example, with 160-bit n, 32-bit index Ci and a TPM of 16 MB EEPROM memory (see [38]), up to 666,667 user instances can be created.
Q9. What is the reason why the latency in audit is a constant value?
This is attributed to the use of explicit key confirmation; otherwise, with the original DHIES, the authors will have to feed in the entire encrypted message and the latency for auditing will have a linear time3.