Académique Documents
Professionnel Documents
Culture Documents
attacks, and realize it in a system called DupLESS. In DupLESS, clients encrypt under messagebased keys obtained
from a key-server via an oblivious PRF protocol. It enables clients to store encrypted data with
an existing service, have the service perform deduplication on their behalf, and yet achieves
strong confidentiality guarantees. In the show that encryption for deduplicated storage can
achieve performance and space savings close to that of using the storage service with plaintext
data. In the studied the problem of providing secure outsourced storage that both supports
deduplication and resists brute-force attacks. In the design a system, DupLESS, that combines a
CE-type baseMLE scheme with the ability to obtain message-derived keys with the help of a key
server (KS) shared amongst a group of clients. The clients interact with the KS by a protocol for
oblivious PRFs, ensuring that the KS can cryptographically mix in secret material to the permessage keys while learning nothing about files stored by clients. These mechanisms ensure that
Dup LESS provides
strong security against external attacks which compromise the SS and communication channels
(nothing is leaked beyond file lengths, equality, and access patterns),and that the security of
DupLESS gracefully degrades in the face of comprised systems. Should a client be
compromised, learning the plaintext underlying another clients ciphertext requires mounting an
online bruteforce attacks (which can be sloIn thed by a rate-limited KS). Should the KS be
compromised, the attacker must still attempt an offline brute-force attack, matching the
guarantees of traditional MLE schemes. The substantial increase in security comes at a modest
price in terms of performance, and a small increase in storage requirements relative to the base
system. The low performance overhead results in part from optimizing the client-to-KS OPRF
protocol, and also from ensuring DupLESS uses a low number of interactions with the SS. In the
show that DupLESS is easy to deploy: it can work transparently on top of any SS implementing
a simple storage interface, as shown by our prototype for Dropbox and Google Drive.
class of threats than proofs of ownership, which In there recommend for deduplication systems
in order to mitigate abuse of services for surreptitious content distribution.
Authors: M. Bellare, C. Namprempre, and G. Neven.
Title: Security proofs for identity-based identification and signature schemes.
This paper provides either security proofs or attacks for a large number of identity-based
identification and signature schemes defined either explicitly or implicitly in existing literature.
Underlying these are a framework that on the one hand helps explain how these schemes are
derived, and on the other hand enables modular security analyses, thereby helping to understand,
simplify and unify previous work. Late eighties and early nineties saw the proposal of many
identity-based identification (IBI) and identity-based signature (IBS) schemes. These include the
Fiat-Shamir IBI and IBS schemes, the Guillou-Quisquater IBI and IBS schemes, the IBS scheme
in Shamirs paper introducing identity based cryptography, and others . Now, new, pairing-based
IBS schemes are being recommend .Prompted by the reneIn thed interest in identity-based
cryptography that has folloIn thed identity-based encryption (IBE), In the decided to revisit the
IBI and IBS areas. An examination of past work revealed the following. Although there is a lot of
work on proving security in the identification domain, it pertains to standard rather than identitybased schemes. (For example, security proofs have been provided for standard identification
schemes related to the Fiat-Shamir and Guillou Quisquater IBI schemes , but not for the IBI
schemes themselves.) In fact, a provable-security treatment of IBI schemes is entirely lacking:
there are no security definitions, and none of the existing schemes is proven secure. Given the
practical importance and usage of IBI schemes, this is an important (and somewhat surprising)
gap.