Preview

Message-Locked Encryption and Secure Deduplication.

Powerful Essays
Open Document
Open Document
18838 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Message-Locked Encryption and Secure Deduplication.
A preliminary version of this paper appears in the proceedings of Eurocrypt 2013. This is the full version.

Message-Locked Encryption and Secure Deduplication
Mihir Bellare1 Sriram Keelveedhi2 Thomas Ristenpart3

March 2013

Abstract We formalize a new cryptographic primitive, Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure deduplication (space-efficient secure outsourced storage), a goal currently targeted by numerous cloud-storage providers. We provide definitions both for privacy and for a form of integrity that we call tag consistency. Based on this foundation, we make both practical and theoretical contributions. On the practical side, we provide ROM security analyses of a natural family of MLE schemes that includes deployed schemes. On the theoretical side the challenge is standard model solutions, and we make connections with deterministic encryption, hash functions secure on correlated inputs and the sample-then-extract paradigm to deliver schemes under different assumptions and for different classes of message sources. Our work shows that MLE is a primitive of both practical and theoretical interest.

Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. Email: mihir@eng.ucsd.edu. URL: http://cseweb.ucsd.edu/~mihir/. Supported in part by NSF grants CNS-0904380, CCF-0915675 and CNS-1116800. 2 Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. Email: sriramkr@cs.ucsd.edu. URL: http://cseweb.ucsd.edu/~skeelvee/. Supported in part by Bellare’s grants. 3 Department of Computer Sciences, University of Wisconsin–Madison, 1210 West Dayton Street, Madison, Wisconsin 53715, USA. Email: rist@cs.wisc.edu. URL: http://pages.cs.wisc.edu/~rist/. Supported in part by NSF grant

You May Also Find These Documents Helpful

  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It was 1944, and the United States had now been an active participant in the war against Nazi Germany for almost three and a half years, nearly six years for the British. During that period occurred a string of engagements fought with ferocious determination and intensity on both sides. There is however, one day which stands out in the minds of many American servicemen more often than others. June 6, 1944, D-Day, was a day in which thousands of young American boys, who poured onto the beaches of Utah and Omaha, became men faster than they would have ever imagined possible. Little did they know of the chaos and the hell which awaited them on their arrival. Over the course of a few hours, the visions of Omaha and Utah Beaches, and the death and destruction…

    • 3035 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Dynamics of a Bouncing Ball

    • 2746 Words
    • 11 Pages

    Research Question: Of plywood, glass, stainless steel, and a ceramic tile, which least affects the dynamics of a bouncing table tennis ball?…

    • 2746 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Better Essays

    Schneider, G.M. & Gersting, J.L., (2013). Invitation to Computer Science. (6th ed.). Boston, Ma: press…

    • 2002 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    128 Bit Encryption

    • 662 Words
    • 2 Pages

    Bradford, C. (2014). 5 Common Encryption Algorithms and the Unbreakables of the Future - StorageCraft. Storagecraft.com. Retrieved 11 February 2015, from http://www.storagecraft.com/blog/5-common-encryption-algorithms/…

    • 662 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    It provides leadership in addressing issues that confront the future of the Internet and is the…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Started focusing on limited edition, seasonal lines. Marc Jacobs was appointed art director in 1998 when LV started their shoes and clothing collections. (p.3)…

    • 435 Words
    • 2 Pages
    Good Essays