没有合适的资源?快使用搜索试试~ 我知道了~
Juan Benet:存储证明论文--即复制证明1
需积分: 0 0 下载量 22 浏览量
2022-08-03
15:44:48
上传
评论
收藏 460KB PDF 举报
温馨提示
试读
10页
Juan Benet:存储证明论文--即复制证明1
资源推荐
资源详情
资源评论
Proof of Replication
Technical Report (WIP)
Juan Benet
1
David Dalrymple Nicola Greco
1
1
Protocol Labs
July 27, 2017
Abstract
We introduce Proof-of-Replication (PoRep), a new kind of Proof-of-Storage, t h a t can be used to prove
that some data D has been replicated to its own uniquely dedicated physical storage. Enforcing unique
physical cop i es enables a verifier to check that a prover is not deduplicating multiple copies of D into
the same storage spac e. This constructi o n is particularly useful in Cloud Computing and Decentralized
Storage Networks, which must be transparently verifiable, res is ta nt to Sybil attacks, and unfriendly to
outsourcing.
This work (a) reviews Proofs-of-Storage and motivates use cases; (b) defines the novel Proofs-of-Replication,
which can be publicly verifiable, transparent, authenticated,andtime-bounded; (c) shows how to chain
Proofs-of-Replication to establish useful Proofs-of-Spacetime.
Work in Progress. This is a work in progress Technical Report from Protocol Labs. Active research
is under way, and new versions of this paper will appear. For comments and suggestions, contact us at
research@filecoin.io
1 Motivation and Background o n Proofs-of-Storage
This section provides backgrounds and classifications of di↵erent Proofs-of-Storage and r el at ed proofs, an d
motivates the need for Proofs-of-Replication. Throughout this section, we explain the distinction between
di↵erent proofs usi ng a prover, P, that is attempt i ng to convince a verifier, V, that P is storing some data,
D. V issues a challenge, c ,toP who answers it with a corresponding proof ⇡
c
, according to the scheme in
question. Proof schemes vary in t he ir properties, their utility, and in whether D is useful outsi d e the protocol
or is a random string with no external utility.
1.1 Common Properties
We use the following properties, common to various proving schemes:
• (Privately Verifiable)Aschemeisprivately verifiable if V is a user with a secret verifying key generated
during setup, or any other party that shares such secret key with th e user. These schemes are useful
in Cloud Computing settings, where users wish to outsou rc e storage of data to servers and perhaps
outsource verifying to a trusted verifier. As of this work, most Proof-of-Storage (PoS) schemes are
privately verifiable.
• (Publicly Verifiable)Aschemeispublicly ver i fiable if V can be any party with access to public data (e.g.
a verifying key), but no access to the origi n al data, or secret information generated during scheme setup.
Publicly verifiable schemes are very useful in Decentralized Storage Network settings, where a verifier may
be n ew participants who have access only to public data as context of previous proof scheme setups.
1
资源评论
食色也
- 粉丝: 28
- 资源: 351
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功