nPPoS: Non-interactive practical proof-of-storage for blockchain

被引:0
|
作者
Heo, Jun Wook [1 ]
Ramachandran, Gowri [1 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 04期
关键词
Blockchain; Proof-of-storage; zk-starks; INTEGRITY VERIFICATION; CLOUD STORAGE; SECURITY; RETRIEVABILITY; PAYMENTS; PRIVACY;
D O I
10.1016/j.bcra.2024.100221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain full nodes are pivotal for transaction availability, as they store the entire ledger, but verifying their storage integrity faces challenges from malicious remote storage attacks such as Sybil, outsourcing, and generation attacks. However, there is no suitable proof-of-storage solution for blockchain full nodes to ensure a healthy number of replicas of the ledger. Existing proof-of-storage solutions are designed for general-purpose settings where a data owner uses secret information to verify storage, rendering them unsuitable for blockchain where proof-of-storage must be fast, publicly verifiable, and data owner-agnostic. This paper introduces a decentralised and quantum-resistant solution named Non-interactive Practical Proof of Storage (nPPoS) with an asymmetric encoding and decoding scheme for fast and secure PoStorage and Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs) for public variability in blockchain full nodes. The algorithm with asymmetric times for encoding and decoding creates unique block replicas and corresponding proofs for each storage node to mitigate malicious remote attacks and minimise performance degradation. The intentional resource-intensive encoding deters attacks, while faster decoding minimises performance overhead. Through zk-STARKs, nPPoS achieves public verifiability, enabling one-to-many verification for scalability, quantum resistance and decentralisation. It also introduces a two-phase randomisation technique and a time-weighted trustworthiness measurement for scalability and adaptability.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Non-interactive Blind Signatures for Random Messages
    Hanzlik, Lucjan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 722 - 752
  • [22] Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof
    Koulianos, Athanasios
    Paraskevopoulos, Panagiotis
    Litke, Antonios
    Papadakis, Nikolaos K.
    SENSORS, 2024, 24 (17)
  • [23] NON-INTERACTIVE I-PROTOCOL CONSTRUCTION
    Polic, Viktor D.
    METALURGIA INTERNATIONAL, 2012, 17 (12): : 81 - 86
  • [24] Dynamic, Non-Interactive Key Management for the Bundle Protocol
    Van Besien, William L.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 75 - 77
  • [25] Poster: Panacea - Stateless and Non-Interactive Oblivious RAM
    Cong, Kelong
    Das, Debajyoti
    Nicolas, Georgio
    Park, Jeongeun
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3585 - 3587
  • [26] Non-interactive Security Framework for Mobile Device based Academic Monitoring System
    Muthusenthil, B.
    Vijayakumaran, C.
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 265 - 276
  • [27] Non-Interactive VDF Client Puzzle for DoS Mitigation
    Raikwar, Mayank
    Gligoroski, Danilo
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 32 - 38
  • [28] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 57 - +
  • [29] IMPLEMENTING AUDITABILITY WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOFS
    Polic, Viktor D.
    METALURGIA INTERNATIONAL, 2012, 17 (11): : 106 - 111
  • [30] UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
    Canetti, Ran
    Gennaro, Rosario
    Goldfeder, Steven
    Makriyannis, Nikolaos
    Peled, Udi
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1769 - 1787