Questions tagged [proof-of-possession]
5 questions
4
votes
1 answer
what is a rigorous definition of "proof-of-possession"?
I cannot find a rigorous definition of what the "proof of possession" attribute means. Different webpages seem to give conflicting definitions:
Some of them say that it means, literally, proving that you possess a value (a key or a…
Bennett
- 165
- 1
- 5
3
votes
1 answer
Can DH be used for privacy-preserving proof of possession?
First time question poster so I hope the below is clear enough :).
Problem summary: Can a Holder and Verifier safely use ECDH for a Challenge-Response protocol where:
the Holder proves possession and control over a private key $d$ using material…
Peter Altmann
- 131
- 6
2
votes
1 answer
Which hash functions have the mathematical properties required to prove data availability?
I'm looking for a specific keyed hash function with security properties that allow it to be used for a step in an interactive proof, in which a Verifier has some message, and the Prover needs to prove that they have the entirety of this message…
AJMansfield
- 136
- 7
2
votes
2 answers
How to require possession of arbitrary data to decrypt a file?
I have pairs of files A and B both of arbitrary size and contents (for any pair of files, A could be significantly larger than B or vice versa). I want to be able to 'encrypt' A in such a way that I can distribute it openly, but so that only people…
825480793
- 21
- 1
0
votes
2 answers
How to use hashes for proof of retrievability (PoR)?
Suppose an owner has a file $F$ stored in a server, and wants proof that the server has the full file. The owner possibly does not store the full file. I was thinking about the following simple schema of challenge-response using only…
Rafael
- 165
- 2
- 8