Skip to main navigation Skip to search Skip to main content

Efficient Proofs of Retrievability Using Expander Codes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Proofs of Retrievability (PoR) protocols ensure that a client can fully retrieve a large outsourced file from an untrusted server. Good PoRs should have low communication complexity, small storage overhead and clear security guarantees. We design a good PoR based on a family of graph codes called expander codes. We use expander codes based on graphs derived from point-line incidence relations of finite affine planes. Høholdt et al. showed that, when using Reed-Solomon codes as inner codes, these codes have good dimension and minimum distance over a relatively small alphabet. Moreover, expander codes possess very efficient unique decoding algorithms. We take advantage of these results to design a PoR scheme that extracts the outsourced file in quasi-linear time and features better concrete parameters than state-of-the-art schemes w.r.t storage overhead and size of the outsourced file.

Original languageEnglish
Title of host publicationCryptology and Network Security - 21st International Conference, CANS 2022, Proceedings
EditorsAlastair R. Beresford, Arpita Patra, Emanuele Bellini
PublisherSpringer Science and Business Media Deutschland GmbH
Pages361-370
Number of pages10
ISBN (Print)9783031209734
DOIs
Publication statusPublished - 1 Jan 2022
Event21st International Conference on Cryptology and Network Security, CANS 2022 - Abu Dhabi, United Arab Emirates
Duration: 13 Nov 202216 Nov 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13641 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Conference on Cryptology and Network Security, CANS 2022
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period13/11/2216/11/22

Keywords

  • Expander codes
  • Outsourced storage
  • Proofs of retrievability

Fingerprint

Dive into the research topics of 'Efficient Proofs of Retrievability Using Expander Codes'. Together they form a unique fingerprint.

Cite this