Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage | SpringerLink
Skip to main content

Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage

  • Chapter
Cryptography and Security: From Theory to Applications

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6805))

  • 2056 Accesses

Abstract

We present a result related to encryption, shared storage and similarity. The new protocol for secure storage of information solves a recent problem of how multiple independent and non-communicating individuals/processes can store and retrieve the same file in a shared storage facility without the use of a key escrow facility. That is, we present a method in which each individual i stores the ciphertext C M,i for the same message M in shared storage at different time with a protocol requiring O(1) ciphertext memory size (i.e., a ciphertext whose size is independent of the number of individuals). Though the individuals can “store” / create the ciphertext for M at different times without communicating with one another or having pre-shared secret data, they must also be able to decrypt the same ciphertext at different times without communicating directly or indirectly with one another. As will be noted in the Introduction, this problem is motivated by approaches used by cloud storage providers. We further extend the result by enhancing the technique to allow an individual i to store \(C_{M_i,i}\) where each M i is similar, but possibly different, yet use less memory than storing multiple ciphertext of each messages.

The result has practical implications in privacy and shared storage as has recently been demonstrated by a regulatory complaint to a cloud storage provider. The result uses multiple techniques from both cryptography and coding theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: CCS 1993: Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM Press, New York (1993), http://cseweb.ucsd.edu/users/mihir/papers/ro.pdf

    Google Scholar 

  2. Berlekamp, E.: Algebraic Coding Theory. McGraw-Hill (1968)

    Google Scholar 

  3. Coron, J.-S., Patarin, J., Seurin, Y.: The Random Oracle Model and the Ideal Cipher Model are Equivalent. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 1–20. Springer, Heidelberg (2008)

    Google Scholar 

  4. Davida, G., Frankel, Y.: Private storage of similar message (in submission)

    Google Scholar 

  5. Federal Trade Commission In the matter of DropBox Inc. Request for investigation and complaint for injunctive releave (May 11, 2011), http://www.wired.com/images_blogs/threatlevel/2011/05/dropbox-ftc-complaint-final.pdf

  6. Peterson, W.W., Weldon, E.J.: Error Correcting Codes. MIT Press (1988)

    Google Scholar 

  7. Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423 (1948)

    MathSciNet  MATH  Google Scholar 

  8. Ryan Single Dropbox Lied to Users About Data Security, Complaint to FTC Alleges, Wired Magazine online (May 13, 2011), http://www.wired.com/threatlevel/2011/05/dropbox-ftc/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Davida, G., Frankel, Y. (2012). Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28368-0_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28367-3

  • Online ISBN: 978-3-642-28368-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics