Method and apparatus for the secure distributed storage and retr

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04L 900

Patent

active

059914149

ABSTRACT:
A solution to the general problem of Secure Storage and Retrieval of Information (SSRI) guarantees that also the process of storing the information is correct even when some processors fail. A user interacts with the storage system by depositing a file and receiving a proof that the deposit was correctly executed. The user interacts with a single distinguished processor called the gateway. The mechanism enables storage in the presence of both inactive and maliciously active faults, while maintaining (asymptotical) space optimailty. This mechanism is enhanced with the added requirement of confidentiality of information; i.e., that a collusion of processors should not be able to learn anything about the information. Also, in this case space optimality is preserved.

REFERENCES:
patent: 5485474 (1996-01-01), Rabin
patent: 5491749 (1996-02-01), Rogaway et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5544322 (1996-08-01), Cheng et al.
patent: 5604490 (1997-02-01), Blakely et al.
patent: 5752041 (1998-05-01), Fosdick
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5832211 (1998-11-01), Blakely, III et al.
David Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Crypto 82, Aug. 1982, pp. 199-203.
Ran Canetti et al., "Proactive Security: Long-Term Protection Against Break-Ins", RSA Laboratories' CryptoBytes, vol. 3, No. 1, Spring 1997, pp. 1-16.
D. Chaum, "Achieving Electronic Privacy", Scientific American, Aug. 1992, pp. 96-101. Copyright .COPYRGT. 1992.
Hugo Krawczyk, "Secret Sharing Made Short", Advances in Cryptology--Crypto 1993, Lecture Notes in Computer Science, pp. 136-146, Springer-Verlag, 1993.
Krawczyk, H., "Distributed Fingerprints and Secure Information Dispersal", Proc. 20.sup.th Anual ACM Symp. On Principles of Disb.backslash.tributed Computing, pp. 207-218, Ithaca, NY, 1993.
Y.G. Desmedt, "Threshold cryptography". European Transactions on Telecommunications, 5(4):449-457, Jul. 1994.
Rabin M., "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance", Journal of the ACM, vol. 36(2), pp.335-348, 1989.
Bellare M. et al., "Keying Hash Functions for Message Authentication," Proc. Advances in Cryptology--CRYPTO 1996, LNCS vol. 1109, Springer-Verlag, pp. 1-15, 1996.
L. Lamport et al., The Byzantine General Problem, ACM Trans. Prog. Lang. and Systems, 4:3 (1982), pp. 382-401.
Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, pp. 612-613, 1979.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for the secure distributed storage and retr does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for the secure distributed storage and retr, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for the secure distributed storage and retr will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1231226

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.