Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing

Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allows third parties to assess the integrity of outsou...

Full description

Saved in:
Bibliographic Details
Main Authors: Mengdi Zhao, Huiyan Chen
Format: Article
Language:English
Published: MDPI AG 2025-07-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/27/7/753
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849734118145785856
author Mengdi Zhao
Huiyan Chen
author_facet Mengdi Zhao
Huiyan Chen
author_sort Mengdi Zhao
collection DOAJ
description Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allows third parties to assess the integrity of outsourced data, offering good openness and flexibility, but it may lead to privacy leakage and security risks. In contrast, private verification restricts the auditing capability to the data owner, providing better privacy protection but often resulting in higher verification costs and operational complexity due to limited local resources. Moreover, most existing PDP schemes are based on classical number-theoretic assumptions, making them vulnerable to quantum attacks. To address these challenges, this paper proposes an identity-based PDP with a designated verifier over lattices, utilizing a specially leveled identity-based fully homomorphic signature (IB-FHS) scheme. We provide a formal security proof of the proposed scheme under the small-integer solution (SIS) and learning with errors (LWE) within the random oracle model. Theoretical analysis confirms that the scheme achieves security guarantees while maintaining practical feasibility. Furthermore, simulation-based experiments show that for a 1 MB file and lattice dimension of <i>n</i> = 128, the computation times for core algorithms such as <b>TagGen</b>, <b>GenProof</b>, and <b>CheckProof</b> are approximately 20.76 s, 13.75 s, and 3.33 s, respectively. Compared to existing lattice-based PDP schemes, the proposed scheme introduces additional overhead due to the designated verifier mechanism; however, it achieves a well-balanced optimization among functionality, security, and efficiency.
format Article
id doaj-art-287c979a803a47b0aa44ac48026cc3f2
institution DOAJ
issn 1099-4300
language English
publishDate 2025-07-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj-art-287c979a803a47b0aa44ac48026cc3f22025-08-20T03:07:54ZengMDPI AGEntropy1099-43002025-07-0127775310.3390/e27070753Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud ComputingMengdi Zhao0Huiyan Chen1Beijing Electronic Science and Technology Institute, Beijing 100070, ChinaBeijing Electronic Science and Technology Institute, Beijing 100070, ChinaProvable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allows third parties to assess the integrity of outsourced data, offering good openness and flexibility, but it may lead to privacy leakage and security risks. In contrast, private verification restricts the auditing capability to the data owner, providing better privacy protection but often resulting in higher verification costs and operational complexity due to limited local resources. Moreover, most existing PDP schemes are based on classical number-theoretic assumptions, making them vulnerable to quantum attacks. To address these challenges, this paper proposes an identity-based PDP with a designated verifier over lattices, utilizing a specially leveled identity-based fully homomorphic signature (IB-FHS) scheme. We provide a formal security proof of the proposed scheme under the small-integer solution (SIS) and learning with errors (LWE) within the random oracle model. Theoretical analysis confirms that the scheme achieves security guarantees while maintaining practical feasibility. Furthermore, simulation-based experiments show that for a 1 MB file and lattice dimension of <i>n</i> = 128, the computation times for core algorithms such as <b>TagGen</b>, <b>GenProof</b>, and <b>CheckProof</b> are approximately 20.76 s, 13.75 s, and 3.33 s, respectively. Compared to existing lattice-based PDP schemes, the proposed scheme introduces additional overhead due to the designated verifier mechanism; however, it achieves a well-balanced optimization among functionality, security, and efficiency.https://www.mdpi.com/1099-4300/27/7/753provable data possessionleveled identity-based fully homomorphic signaturedesignated verifierlattice
spellingShingle Mengdi Zhao
Huiyan Chen
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Entropy
provable data possession
leveled identity-based fully homomorphic signature
designated verifier
lattice
title Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
title_full Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
title_fullStr Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
title_full_unstemmed Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
title_short Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
title_sort identity based provable data possession with designated verifier from lattices for cloud computing
topic provable data possession
leveled identity-based fully homomorphic signature
designated verifier
lattice
url https://www.mdpi.com/1099-4300/27/7/753
work_keys_str_mv AT mengdizhao identitybasedprovabledatapossessionwithdesignatedverifierfromlatticesforcloudcomputing
AT huiyanchen identitybasedprovabledatapossessionwithdesignatedverifierfromlatticesforcloudcomputing