nPPoS: Non-interactive practical proof-of-storage for blockchain

被引:0
|
作者
Heo, Jun Wook [1 ]
Ramachandran, Gowri [1 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 04期
关键词
Blockchain; Proof-of-storage; zk-starks; INTEGRITY VERIFICATION; CLOUD STORAGE; SECURITY; RETRIEVABILITY; PAYMENTS; PRIVACY;
D O I
10.1016/j.bcra.2024.100221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain full nodes are pivotal for transaction availability, as they store the entire ledger, but verifying their storage integrity faces challenges from malicious remote storage attacks such as Sybil, outsourcing, and generation attacks. However, there is no suitable proof-of-storage solution for blockchain full nodes to ensure a healthy number of replicas of the ledger. Existing proof-of-storage solutions are designed for general-purpose settings where a data owner uses secret information to verify storage, rendering them unsuitable for blockchain where proof-of-storage must be fast, publicly verifiable, and data owner-agnostic. This paper introduces a decentralised and quantum-resistant solution named Non-interactive Practical Proof of Storage (nPPoS) with an asymmetric encoding and decoding scheme for fast and secure PoStorage and Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs) for public variability in blockchain full nodes. The algorithm with asymmetric times for encoding and decoding creates unique block replicas and corresponding proofs for each storage node to mitigate malicious remote attacks and minimise performance degradation. The intentional resource-intensive encoding deters attacks, while faster decoding minimises performance overhead. Through zk-STARKs, nPPoS achieves public verifiability, enabling one-to-many verification for scalability, quantum resistance and decentralisation. It also introduces a two-phase randomisation technique and a time-weighted trustworthiness measurement for scalability and adaptability.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [32] Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 261 - 271
  • [33] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [34] UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
    Canetti, Ran
    Gennaro, Rosario
    Goldfeder, Steven
    Makriyannis, Nikolaos
    Peled, Udi
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1769 - 1787
  • [35] Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs
    Zhou, Yuan
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 764 - 775
  • [36] Broadcast encryption based non-interactive key distribution in MANETs
    Yang, Yang
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 533 - 545
  • [37] Developing non-interactive MPC with trusted hardware for enhanced security
    Karl, Ryan
    Burchfield, Hannah
    Takeshita, Jonathan
    Jung, Taeho
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 777 - 797
  • [38] Tamper-proof multitenant data storage using blockchain
    Sharma, Aditi
    Kaur, Parmeet
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 431 - 449
  • [39] Efficient and non-interactive ciphertext range query based on differential privacy
    Feng, Peirou
    Sheng, Qitian
    Wang, Jianfeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2022, 25 (05) : 490 - 503
  • [40] Distributed Electronic Data Storage and Proof System Based on Blockchain
    Wang, Jitao
    Sun, Guozi
    Gu, Yu
    Liu, Kun
    BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 48 - 67