22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

from Section 6 that is NRPH secure. After this attack, the adversary still maintains a good probability of<br />

passing a subsequent audit. However, by deleting only a single ciphertext in one of the cuckoo tables, the<br />

attacker now deleted only a single codeword symbol, not a full block of n of them. And now we can show<br />

that our extractor can still recover enough of the other symbols of the codeword block so that the erasure<br />

code will enable recovery of the original data. Of course, the server could start deleting more of the locations<br />

in the lowest level cuckoo table, but he cannot selectively target codeword symbols belonging to a single<br />

codeword block, since it has no idea where those reside. If he starts to delete too many of them just to make<br />

sure a message block is not recoverable, then he will lose his ability to pass an audit.<br />

27<br />

9. Dynamic Proofs of Retrievability via Oblivious RAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!