Abstract
We present new decentralized storage systems that are resilient to arbitrary failures of up to a half of all servers and can tolerate a computationally unbounded adversary. These are the first such results with space requirements smaller than those of full replication without relying on cryptographic assumptions. We also significantly reduce share sizes for robust secret-sharing schemes with or without an honest dealer, again without cryptographic assumptions. A major ingredient in our systems is an information verification scheme that replaces hashing (for storage systems) or information checking protocols (for secret sharing). Together with a new way of organizing verification information, this allows us to use a simple majority algorithm to identify with high probability all servers whose information hasn’t been corrupted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Rabin, T.: Robust sharing of secrets when the dealer is honest or cheating. Journal of the ACM 41, 1089–1109 (1994)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of error-correcting codes. North-Holland, Amsterdam (1977)
Krawczyk, H.: Distributed fingerprints and secure information dispersal. In: Proceedings of the 12th annual ACM symposium on principles of distributed computing, pp. 207–218 (1993)
Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. Information and Computation 174, 203–213 (2002)
Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Addendum to Scalable secure storage when half the system is faulty (2003) (unpublished manuscript)
Stinson, D., Wei, R.: Bibliography on secret sharing schemes (1998), Available on the Internet at http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html
Boyer, R.S., Moore, J.S.: MJRTY—a fast majority vote algorithm. In: Boyer, R.S. (ed.) Automated reasoning: Essays in honor of Willy Bledsoe, pp. 105–117. Kluwer, Dordrecht (1991)
Rabin, M.O.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM 36, 335–348 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bazzi, R.A., Konjevod, G. (2004). Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty. In: Guerraoui, R. (eds) Distributed Computing. DISC 2004. Lecture Notes in Computer Science, vol 3274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30186-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-30186-8_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23306-0
Online ISBN: 978-3-540-30186-8
eBook Packages: Springer Book Archive