Comment on A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage
2021
Recently, Rabaninejad et al. proposed an excellent auditing protocol for shared data (CoRPA, for short) [IEEE Trans. Ser. Comp., DOI 10.1109/TSC.2019.2919627], which has many better properties, like the identity-privacy, collusion resistant, efficient user revocation and supporting dynamic update etc. In addition, they also presented the detailed security analysis for CoRPA and described the reduction from the soundness of CoRPA to discrete logarithm assumption. However, in this paper, we analyze their original security reduction (to discrete logarithm) and find out that it is incorrect and misleading. That is, the soundness of CoRPA can not be obtained from the discrete logarithm assumption. Now, we give a new proof for their CoRPA based on the square-CDH assumption, which is also used by them to prove the security of homomorphic proxy re-signature scheme. We also hope the new security proof will provide theoretical guarantee when using CoRPA in practical scenes.
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI