Affiliation:
1. Weizmann Institute of Science, Rehovot, Israel
2. MIT, Cambridge, Massachusetts
Abstract
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized) “fingerprint” on his own computer. This is the setting for the well-studied authentication problem in cryptography, and the required fingerprint size is well understood. We study the problem of sublinear authentication: suppose the user would like to encode and store the file in a way that allows him to verify that it has not been corrupted, but without reading the entire file. If the user only wants to read
q
bits of the file, how large does the size
s
of the private fingerprint need to be? We define this problem formally, and show a tight lower bound on the relationship between
s
and
q
when the adversary is not computationally bounded, namely:
s
×
q
= Ω(
n
), where
n
is the file size. This is an easier case of the online memory checking problem, introduced by Blum et al. [1991], and hence the same (tight) lower bound applies also to that problem.
It was previously shown that, when the adversary is computationally bounded, under the assumption that one-way functions exist, it is possible to construct much better online memory checkers. The same is also true for sublinear authentication schemes. We show that the existence of one-way functions is also a necessary condition: even slightly breaking the
s
×
q
= Ω(
n
) lower bound in a computational setting implies the existence of one-way functions.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information Security and Cloud Computing;Synthesis Lectures on Engineering, Science, and Technology;2024-07-13
2. Memory Checking Requires Logarithmic Overhead;Proceedings of the 56th Annual ACM Symposium on Theory of Computing;2024-06-10
3. Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification;IEEE Transactions on Network and Service Management;2023-12
4. Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography;2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS);2023-11-06
5. Learning in Pessiland via Inductive Inference;2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS);2023-11-06