Storage Enforcement with Kolmogorov Complexity and List Decoding
نویسندگان
چکیده
We consider the following problem that arises in outsourced storage: a user stores her data x on a remote server but wants to audit the server at some later point to make sure it actually did store x. The goal is to design a (randomized) verification protocol that has the property that if the server passes the verification with some reasonably high probability then the user can rest assured that the server is storing x. While doing this, we need to minimize the user’s storage and the total amount of communication between the server and the user. This is the data possession problem and is closely related to the problem of obtaining a ’proof of retrievability’. Existing schemes with provable guarantees mostly use cryptographic primitives and can only guarantee that the server is storing a constant fraction of the amount of information that it is supposed to store. In this work we present an optimal solution (in terms of the user’s storage and communication) while at the same time ensuring that a server that passes the verification protocol with any reasonable probability will store, to within a small additive factor, C(x) bits of information, where C(x) is the plain Kolmogorov complexity of x. (Since we cannot prevent the server from compressing x, C(x) is a natural upper bound.) The proof of security of our protocol combines Kolmogorov complexity with list decoding and unlike previous work that relies upon cryptographic assumptions, we allow the server to have unlimited computational power. To the best of our knowledge, this is the first work that combines Kolmogorov complexity and list decoding. Our framework is general enough to capture extensions where the user splits up x and stores the fragment across multiple servers and our verification protocol can handle non-responsive servers and colluding servers. As a by-product, we also get a proof of retrievability. Finally, our results also have an application in ‘storage enforcement’ schemes, which in turn have an application in trying to update a remote server that is potentially infected with a virus.
منابع مشابه
Almost Universal Hash Families are also Storage Enforcing
We show that every almost universal hash function also has the storage enforcement property. Almost universal hash functions have found numerous applications and we show that this new storage enforcement property allows the application of almost universal hash functions in a wide range of remote verification tasks: (i) Proof of Secure Erasure (where we want to remotely erase and securely update...
متن کاملSearch Based Weighted Multi-Bit Flipping Algorithm for High-Performance Low-Complexity Decoding of LDPC Codes
In this paper, two new hybrid algorithms are proposed for decoding Low Density Parity Check (LDPC) codes. Original version of the proposed algorithms named Search Based Weighted Multi Bit Flipping (SWMBF). The main idea of these algorithms is flipping variable multi bits in each iteration, change in which leads to the syndrome vector with least hamming weight. To achieve this, the proposed algo...
متن کاملSearch Based Weighted Multi-Bit Flipping Algorithm for High-Performance Low-Complexity Decoding of LDPC Codes
In this paper, two new hybrid algorithms are proposed for decoding Low Density Parity Check (LDPC) codes. Original version of the proposed algorithms named Search Based Weighted Multi Bit Flipping (SWMBF). The main idea of these algorithms is flipping variable multi bits in each iteration, change in which leads to the syndrome vector with least hamming weight. To achieve this, the proposed algo...
متن کاملUnclonable identification and authentication based on reference list decoding
In this paper we advocate a new approach to item identification based on physical unclonable features. Being unique characteristics of an item, these features represent a kind of unstructured random codebook that links the identification problem to digital communications via composite hypothesis testing. Besides this, complexity, memory storage and universality constraints should be taken into ...
متن کاملcient parallel algorithm for list Viterbi decoding
There is nowadays an increasing interest in list Viterbi decoding, especially for transmission of audio and video over wireless channels. List Viterbi decoding outperforms conventional Viterbi decoding at the expense of an increase in complexity. In this paper, we propose an e cient parallel list Viterbi algorithm with lower computational complexity and memory requirements. ? 2002 Elsevier Scie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 18 شماره
صفحات -
تاریخ انتشار 2011