Conference paper Open Access

Verifiable Message-Locked Encryption

Canard, Sébastien; Laguillaumie, Fabien; Paindavoine

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.58898</identifier>
      <creatorName>Canard, Sébastien</creatorName>
      <affiliation>Orange Labs</affiliation>
      <creatorName>Laguillaumie, Fabien</creatorName>
      <affiliation>Orange Labs</affiliation>
    <title>Verifiable Message-Locked Encryption</title>
    <date dateType="Issued">2016-07-06</date>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf"></relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf"></relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution Non Commercial Share Alike 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;One of today’s main challenge related to cloud storage is to maintain the  functionalities and the efficiency of customers’ and service providers’ usual  environments while protecting the confidentiality of sensitive data. Deduplication is one of those functionalities: it enables cloud storage providers to save a lot of  memory by storing only once a file uploaded several times. However, classical  encryption schemes block deduplication. One needs to use a “message-locked  encryption” scheme (MLE), which allows the detection of duplicates and the  storage of only one encrypted file on the server, which can be decrypted by any  owner of the file. However, in most existing scheme, a user can bypass this  deduplication protocol. In this article, we provide servers verifiability for MLE schemes: the servers can verify that the ciphertexts are well-formed. This property  forces a customer to prove that she complied to the deduplication  protocol, thus preventing her to deviate from the prescribed functionality of MLE. Then, we provide an MLE scheme satisfying this new security property. To  achieve the deduplication consistency, our construction primarily relies on  zero-knowledge proofs. Unlike Abadi et al.’s MLE, we instantiate those proofs, so&lt;br&gt;
that we obtain a more efficient scheme, secure in the random oracle model.&lt;/p&gt;</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/643964/">643964</awardNumber>
All versions This version
Views 8484
Downloads 4848
Data volume 29.5 MB29.5 MB
Unique views 8484
Unique downloads 4848


Cite as