Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Updatable encryption in distributed storage systems using key-homomorphic pseudorandom functions - MaRDI portal

Updatable encryption in distributed storage systems using key-homomorphic pseudorandom functions (Q517741)

From MaRDI portal





scientific article; zbMATH DE number 6697268
Language Label Description Also known as
English
Updatable encryption in distributed storage systems using key-homomorphic pseudorandom functions
scientific article; zbMATH DE number 6697268

    Statements

    Updatable encryption in distributed storage systems using key-homomorphic pseudorandom functions (English)
    0 references
    0 references
    0 references
    27 March 2017
    0 references
    Summary: Distributed storage systems (DSSs) store linear combinations of data across different nodes such that, data lost due to node failures can be restored from surviving nodes. We address key rotation in DSSs: assume that a user wants to remotely change the encryption key of a file stored in a DSS by safely delegating the re-encryption process to the storage network. A problem arises because the data to be re-encrypted is not directly stored in the system (only linear combinations are stored). We propose a solution in which a key-homomorphic pseudorandom function (KH-PRF) is used in counter-mode encryption to make this delegation possible. Our solution requires the homomorphism to be applied several times. Previous constructions of KH-PRFs add noise to their functions which limits the number of times that the homomorphism can be applied. In this paper, we propose the first `noiseless' key-homomorphic PRFs.
    0 references
    authentication
    0 references
    distributed storage networks
    0 references
    elliptic curves
    0 references
    information security
    0 references
    secrecy
    0 references

    Identifiers