Abstract
We present a result related to encryption, shared storage and similarity. The new protocol for secure storage of information solves a recent problem of how multiple independent and non-communicating individuals/processes can store and retrieve the same file in a shared storage facility without the use of a key escrow facility. That is, we present a method in which each individual i stores the ciphertext C M,i for the same message M in shared storage at different time with a protocol requiring O(1) ciphertext memory size (i.e., a ciphertext whose size is independent of the number of individuals). Though the individuals can “store” / create the ciphertext for M at different times without communicating with one another or having pre-shared secret data, they must also be able to decrypt the same ciphertext at different times without communicating directly or indirectly with one another. As will be noted in the Introduction, this problem is motivated by approaches used by cloud storage providers. We further extend the result by enhancing the technique to allow an individual i to store \(C_{M_i,i}\) where each M i is similar, but possibly different, yet use less memory than storing multiple ciphertext of each messages.
The result has practical implications in privacy and shared storage as has recently been demonstrated by a regulatory complaint to a cloud storage provider. The result uses multiple techniques from both cryptography and coding theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: CCS 1993: Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM Press, New York (1993), http://cseweb.ucsd.edu/users/mihir/papers/ro.pdf
Berlekamp, E.: Algebraic Coding Theory. McGraw-Hill (1968)
Coron, J.-S., Patarin, J., Seurin, Y.: The Random Oracle Model and the Ideal Cipher Model are Equivalent. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 1–20. Springer, Heidelberg (2008)
Davida, G., Frankel, Y.: Private storage of similar message (in submission)
Federal Trade Commission In the matter of DropBox Inc. Request for investigation and complaint for injunctive releave (May 11, 2011), http://www.wired.com/images_blogs/threatlevel/2011/05/dropbox-ftc-complaint-final.pdf
Peterson, W.W., Weldon, E.J.: Error Correcting Codes. MIT Press (1988)
Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423 (1948)
Ryan Single Dropbox Lied to Users About Data Security, Complaint to FTC Alleges, Wired Magazine online (May 13, 2011), http://www.wired.com/threatlevel/2011/05/dropbox-ftc/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Davida, G., Frankel, Y. (2012). Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-28368-0_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28367-3
Online ISBN: 978-3-642-28368-0
eBook Packages: Computer ScienceComputer Science (R0)