Title: Enabling identity-based cloud storage public auditing with quantum computers resistance

Authors: Xiaojun Zhang; Chunxiang Xu; Chunhua Jin

Addresses: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China

Abstract: With the rapid development of cloud storage technology, users choose to store their data in the cloud server remotely. Without the burden of local data storage and maintenance, users can enjoy on-demand high quality cloud storage services. Recently, lattice-based cryptography has been considered as the best choice for post-quantum cryptography, which can resist quantum computer attacks. Considering the forthcoming of the quantum computer in the near future, in this paper, we propose an efficient identity-based cloud storage public auditing scheme, which is constructed based on lattice. We prove our scheme can guarantee public verifiability, unforgeability. Moreover, our scheme can prevent the third party auditor (TPA) from revealing the primitive data blocks of cloud users. In particular, to achieve efficient data dynamics, by utilising index hash tables, our auditing scheme can efficiently perform dynamic operations. Efficient performance analysis demonstrates that our public auditing scheme is more efficient and more practical even in the post-quantum cryptographic era.

Keywords: public auditing; cloud storage; lattice-based signature; post-quantum cryptography; identity-based storage; quantum computing; cloud computing; quantum computer attacks; public verifiability; unforgeability; index hash tables; cloud security.

DOI: 10.1504/IJESDF.2016.073736

International Journal of Electronic Security and Digital Forensics, 2016 Vol.8 No.1, pp.82 - 98

Received: 02 Jun 2015
Accepted: 30 Sep 2015

Published online: 16 Dec 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article