Questions tagged [proof-of-possession]

5 questions
4
votes
1 answer

what is a rigorous definition of "proof-of-possession"?

I cannot find a rigorous definition of what the "proof of possession" attribute means. Different webpages seem to give conflicting definitions: Some of them say that it means, literally, proving that you possess a value (a key or a…
Bennett
  • 165
  • 1
  • 5
3
votes
1 answer

Can DH be used for privacy-preserving proof of possession?

First time question poster so I hope the below is clear enough :). Problem summary: Can a Holder and Verifier safely use ECDH for a Challenge-Response protocol where: the Holder proves possession and control over a private key $d$ using material…
2
votes
1 answer

Which hash functions have the mathematical properties required to prove data availability?

I'm looking for a specific keyed hash function with security properties that allow it to be used for a step in an interactive proof, in which a Verifier has some message, and the Prover needs to prove that they have the entirety of this message…
AJMansfield
  • 136
  • 7
2
votes
2 answers

How to require possession of arbitrary data to decrypt a file?

I have pairs of files A and B both of arbitrary size and contents (for any pair of files, A could be significantly larger than B or vice versa). I want to be able to 'encrypt' A in such a way that I can distribute it openly, but so that only people…
825480793
  • 21
  • 1
0
votes
2 answers

How to use hashes for proof of retrievability (PoR)?

Suppose an owner has a file $F$ stored in a server, and wants proof that the server has the full file. The owner possibly does not store the full file. I was thinking about the following simple schema of challenge-response using only…
Rafael
  • 165
  • 2
  • 8