How to Delete a Secret
نویسنده
چکیده
This paper discusses the secure data erasure problem and introduces a new Proof of Deletion protocol, which assures secure data deletion in a way that any independent third party can verify cryptographically. The use of cryptography in data deletion is not new, but previous solutions are unsatisfactory as they merely return a single bit: whether the deletion is successful. However, this single bit is not easily verifiable. The implementation of the underlying deletion mechanism is entirely opaque to a user. This is particularly the case when the encryption program is encapsulated within a tamper resistant chip. Furthermore, all existing solutions claim only to make "best efforts" to delete data, but without any commitment to the outcome. Our protocol systematically addresses all these issues. First, we provide an auditing function to facilitate a user verifying that the encryption was done correctly. Second, instead of returning just one bit like all previous data deletion schemes, our solution returns a proof of deletion that is universally verifiable. This returned proof formalizes the commitment of the storage system in erasing data and cryptographically binds this commitment to the outcome of the operation. © 2012 Newcastle University. Printed and published by Newcastle University, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details
منابع مشابه
Intelligent Mapping
This paper is directed to the question of how to model and design an efficient tool for the intelligent mapping which is based on both dynamic and efficient storage of data and soft computing. The former is performed by our method that learns how to store, search and delete the data. After pointing out the limitation of the crisp evaluation of the distance between two points, we argue in favor ...
متن کاملUpdating attribute in CP-ABE: A New Approach
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the changing attributes. According to our obse...
متن کاملLocal Bounds for the Optimal Information Ratio of Secret Sharing Schemes
The information ratio of a secret sharing scheme Σ measures the size of the largest share of the scheme, and is denoted by σ(Σ). The optimal information ratio of an access structure Γ is the infimum of σ(Σ) among all schemes Σ for Γ, and is denoted by σ(Γ). The main result of this work is that for every two access structures Γ and Γ′, |σ(Γ)− σ(Γ′)| ≤ |Γ∪ Γ′| − |Γ∩ Γ′|. We prove it constructivel...
متن کاملThe Representation of Secret in Masnavi Manavi
Being one of the significant mystic books, Masnavi Manavi has a prominent place in presenting ontology of human being. As though by its revelation, one can reach many mystic and human concepts. Some of the important issues in this work include knowing the secret and secret keeping. The most profound place in Masnavi is where secret and secret keeping are mentioned. Molavi, himself as a...
متن کاملA Key Management Protocol for Hierachical Wireless Sensor Networks
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important issue for WSNs. This paper proposes a novel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012