Proving Erasure Article Swipe
Related Concepts
Computer science
Eavesdropping
Encryption
Computer security
Sketch
BB84
Protocol (science)
Cryptography
Vulnerability (computing)
Computer network
Theoretical computer science
Quantum cryptography
Quantum
Algorithm
Quantum information
Medicine
Alternative medicine
Physics
Quantum mechanics
Pathology
Xavier Coiteux-Roy
,
Stefan Wolf
·
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1109/isit.2019.8849661
· OA: W2979122684
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1109/isit.2019.8849661
· OA: W2979122684
It seems impossible to certify that a remote hosting service does not leak\nits users' data --- or does quantum mechanics make it possible? We investigate\nif a server hosting data can information-theoretically prove its definite\ndeletion using a "BB84-like" protocol. To do so, we first rigorously introduce\nan alternative to privacy by encryption: privacy delegation. We then apply this\nnovel concept to provable deletion and remote data storage. For both tasks, we\npresent a protocol, sketch its partial security, and display its vulnerability\nto eavesdropping attacks targeting only a few bits.\n
Related Topics
Finding more related topics…