Visible to the public Homomorphic Linear Authentication Schemes from (\$textbackslashepsilon\$)-Authentication Codes

TitleHomomorphic Linear Authentication Schemes from (\$textbackslashepsilon\$)-Authentication Codes
Publication TypeConference Paper
Year of Publication2016
AuthorsHan, Shuai, Liu, Shengli, Zhang, Fangguo, Chen, Kefei
Conference NameProceedings of the 11th ACM on Asia Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4233-9
Keywordsauthentication code, coding theory, composability, homomorphic linear authentication scheme, Metrics, proofs of data possession, proofs of retrievability, pubcrawl, Resiliency, security
Abstract

Proofs of Data Possession/Retrievability (PoDP/PoR) schemes are essential to cloud storage services, since they can increase clients' confidence on the integrity and availability of their data. The majority of PoDP/PoR schemes are constructed from homomorphic linear authentication (HLA) schemes, which decrease the price of communication between the client and the server. In this paper, a new subclass of authentication codes, named e-authentication codes, is proposed, and a modular construction of HLA schemes from e-authentication codes is presented. We prove that the security notions of HLA schemes are closely related to the size of the authenticator/tag space and the successful probability of impersonation attacks (with non-zero source states) of the underlying e-authentication codes. We show that most of HLA schemes used for the PoDP/PoR schemes are instantiations of our modular construction from some e-authentication codes. Following this line, an algebraic-curves-based e-authentication code yields a new HLA scheme.

URLhttp://doi.acm.org/10.1145/2897845.2897859
DOI10.1145/2897845.2897859
Citation Keyhan_homomorphic_2016