Visible to the public Biblio

Filters: Author is Chen, Kefei  [Clear All Filters]
2017-03-20
Han, Shuai, Liu, Shengli, Zhang, Fangguo, Chen, Kefei.  2016.  Homomorphic Linear Authentication Schemes from (\$textbackslashepsilon\$)-Authentication Codes. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. :487–498.

Proofs of Data Possession/Retrievability (PoDP/PoR) schemes are essential to cloud storage services, since they can increase clients' confidence on the integrity and availability of their data. The majority of PoDP/PoR schemes are constructed from homomorphic linear authentication (HLA) schemes, which decrease the price of communication between the client and the server. In this paper, a new subclass of authentication codes, named ε-authentication codes, is proposed, and a modular construction of HLA schemes from ε-authentication codes is presented. We prove that the security notions of HLA schemes are closely related to the size of the authenticator/tag space and the successful probability of impersonation attacks (with non-zero source states) of the underlying ε-authentication codes. We show that most of HLA schemes used for the PoDP/PoR schemes are instantiations of our modular construction from some ε-authentication codes. Following this line, an algebraic-curves-based ε-authentication code yields a new HLA scheme.