Hourglass schemes: how to prove that cloud files are encrypted

We consider the following challenge: How can a cloud storage provider prove to a tenant that it's encrypting files at rest, when the provider itself holds the corresponding encryption keys? Such proofs demonstrate sound encryption policies and file confidentiality. (Cheating, cost-cutting, or m...

Full description

Bibliographic Details
Main Authors: van Dijk, Marten, Juels, Ari, Oprea, Alina, Rivest, Ronald L., Stefanov, Emil, Triandopoulos, Nikos
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:en_US
Published: Association for Computing Machinery (ACM) 2014
Online Access:http://hdl.handle.net/1721.1/90626
https://orcid.org/0000-0002-7105-3690