### Abstract

Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in which the server proves that it (still) possesses the client's data. Constructions of PoR schemes attempt to minimize the client and server storage, the communication complexity of an audit, and even the number of file-blocks accessed by the server during the audit. In this work, we identify several different variants of the problem (such as bounded-use vs. unbounded-use, knowledge-soundness vs. information-soundness), and giving nearly optimal PoR schemes for each of these variants. Our constructions either improve (and generalize) the prior PoR constructions, or give the first known PoR schemes with the required properties. In particular, we Formally prove the security of an (optimized) variant of the bounded-use scheme of Juels and Kaliski [JK07], without making any simplifying assumptions on the behavior of the adversary. Build the first unbounded-use PoR scheme where the communication complexity is linear in the security parameter and which does not rely on Random Oracles, resolving an open question of Shacham and Waters [SW08]. Build the first bounded-use scheme with information-theoretic security. The main insight of our work comes from a simple connection between PoR schemes and the notion of hardness amplification, extensively studied in complexity theory. In particular, our improvements come from first abstracting a purely information-theoretic notion of PoR codes, and then building nearly optimal PoR codes using state-of-the-art tools from coding and complexity theory.

Original language | English (US) |
---|---|

Title of host publication | Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings |

Pages | 109-127 |

Number of pages | 19 |

DOIs | |

State | Published - 2009 |

Event | 6th Theory of Cryptography Conference, TCC 2009 - San Francisco, CA, United States Duration: Mar 15 2009 → Mar 17 2009 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 5444 LNCS |

ISSN (Print) | 0302-9743 |

ISSN (Electronic) | 1611-3349 |

### Other

Other | 6th Theory of Cryptography Conference, TCC 2009 |
---|---|

Country | United States |

City | San Francisco, CA |

Period | 3/15/09 → 3/17/09 |

### ASJC Scopus subject areas

- Theoretical Computer Science
- Computer Science(all)

## Fingerprint Dive into the research topics of 'Proofs of Retrievability via Hardness Amplification'. Together they form a unique fingerprint.

## Cite this

*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings*(pp. 109-127). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5444 LNCS). https://doi.org/10.1007/978-3-642-00457-5_8