Conference paper Open Access

Veriable Message-Locked Encryption

Canard, Sébastien; Laguillaumie, Fabien; Paindavoine, Marie


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/bd6c6764-41bd-40ce-a74a-28a4386f56c8/Verifiable-Message-Locked-Encryption.pdf"
      }, 
      "checksum": "md5:3387f6e92ae231ef5c67a31b2aeb4f23", 
      "bucket": "bd6c6764-41bd-40ce-a74a-28a4386f56c8", 
      "key": "Verifiable-Message-Locked-Encryption.pdf", 
      "type": "pdf", 
      "size": 417173
    }
  ], 
  "owners": [
    21446
  ], 
  "doi": "10.5281/zenodo.246798", 
  "stats": {
    "version_unique_downloads": 33.0, 
    "unique_views": 70.0, 
    "views": 71.0, 
    "version_views": 71.0, 
    "unique_downloads": 33.0, 
    "version_unique_views": 70.0, 
    "volume": 14183882.0, 
    "version_downloads": 34.0, 
    "downloads": 34.0, 
    "version_volume": 14183882.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.246798", 
    "latest_html": "https://zenodo.org/record/246798", 
    "bucket": "https://zenodo.org/api/files/bd6c6764-41bd-40ce-a74a-28a4386f56c8", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.246798.svg", 
    "html": "https://zenodo.org/record/246798", 
    "latest": "https://zenodo.org/api/records/246798"
  }, 
  "created": "2017-01-16T08:42:33.708898+00:00", 
  "updated": "2020-01-20T17:45:03.630137+00:00", 
  "conceptrecid": "734873", 
  "revision": 7, 
  "id": 246798, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.246798", 
    "description": "<p>One of today's main challenge related to cloud storage is to maintain the functionalities and the efficiency of customers' and service providers' usual environments, while protecting the confidentiality of sensitive data. Deduplication is one of those functionalities: it enables cloud storage providers to save a lot of memory by storing only once a le uploaded several times. But classical encryption blocks deduplication. One needs to use a \\message-locked encryption\" (MLE), which allows the detection of duplicates and the storage of only one encrypted le on the server, which can be decrypted by any owner of the file. However, in most existing scheme, a user can bypass this deduplication protocol. In this article, we provide servers verifiability for MLE schemes: the servers can verify that the ciphertexts are well-formed. This property that we formally dene forces a customer to prove that she complied to the deduplication protocol, thus preventing her to deviate from the prescribed functionality of MLE. We call it deduplication consistency. To achieve this deduplication consistency, we provide (i) a generic transformation that applies to any MLE scheme and (ii) an ElGamal-based deduplication-consistent MLE, which is secure in the random oracle model.</p>", 
    "license": {
      "id": "CC-BY-SA-4.0"
    }, 
    "title": "Veriable Message-Locked Encryption", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "734873"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "246798"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "643964", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::643964"
        }, 
        "title": "USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS", 
        "acronym": "SUPERCLOUD", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "communities": [
      {
        "id": "ecfunded"
      }, 
      {
        "id": "supercloud"
      }
    ], 
    "publication_date": "2016-11-16", 
    "creators": [
      {
        "affiliation": "Orange Labs", 
        "name": "Canard, S\u00e9bastien"
      }, 
      {
        "affiliation": "LIP", 
        "name": "Laguillaumie, Fabien"
      }, 
      {
        "affiliation": "Orange Labs, LIP", 
        "name": "Paindavoine, Marie"
      }
    ], 
    "meeting": {
      "acronym": "CANS 2016", 
      "url": "http://cans2016.di.unimi.it/", 
      "dates": "14-16 November", 
      "place": "Milan", 
      "title": "15th International Conference on Cryptology and Network Security"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }
  }
}
71
34
views
downloads
All versions This version
Views 7171
Downloads 3434
Data volume 14.2 MB14.2 MB
Unique views 7070
Unique downloads 3333

Share

Cite as