Proving Erasure
Title | Proving Erasure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Coiteux-Roy, Xavier, Wolf, Stefan |
Conference Name | 2019 IEEE International Symposium on Information Theory (ISIT) |
Date Published | jul |
ISBN Number | 978-1-5386-9291-2 |
Keywords | BB84-like protocol, cryptography, data deletion, data privacy, data storage, definite deletion, eavesdropping, Encryption, Human Behavior, human factors, information theoretic security, information-theoretic security, information-theoretically, Metrics, policy-based governance, privacy amplification., privacy delegation, Protocols, provable deletion, pubcrawl, quantum cryptography, Quantum mechanics, remote data storage, remote hosting service, resilience, Resiliency, Scalability, server hosting data, Servers, storage management, users |
Abstract | It seems impossible to certify that a remote hosting service does not leak its users' data - or does quantum mechanics make it possible? We investigate if a server hosting data can information-theoretically prove its definite deletion using a "BB84-like" protocol. To do so, we first rigorously introduce an alternative to privacy by encryption: privacy delegation. We then apply this novel concept to provable deletion and remote data storage. For both tasks, we present a protocol, sketch its partial security, and display its vulnerability to eavesdropping attacks targeting only a few bits. |
URL | https://ieeexplore.ieee.org/document/8849661 |
DOI | 10.1109/ISIT.2019.8849661 |
Citation Key | coiteux-roy_proving_2019 |
- privacy amplification.
- users
- storage management
- Servers
- server hosting data
- Scalability
- Resiliency
- resilience
- remote hosting service
- remote data storage
- Quantum mechanics
- quantum cryptography
- pubcrawl
- provable deletion
- Protocols
- privacy delegation
- data deletion
- policy-based governance
- Metrics
- information-theoretically
- information-theoretic security
- information theoretic security
- Human Factors
- Human behavior
- encryption
- eavesdropping
- definite deletion
- data storage
- data privacy
- Cryptography
- BB84-like protocol