首页> 外文OA文献 >Cryptographic techniques used to provide integrity of digital content in long-term storage
【2h】

Cryptographic techniques used to provide integrity of digital content in long-term storage

机译:用于在长期存储中提供数字内容完整性的加密技术

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage. The secondary objective was to provide methods for the evaluation of data loss and recovery. Additionally, we have provided the following initial constraints for the problem: a limitation of additional storage space, a minimal threshold for desired level of data integrity and a defined probability of a single-bit corruption.ududWith regard to the main objective, the study group focused on the exploration methods based on hash values. It has been indicated that in the case of tight constraints, suggested by PWPW, it is not possible to provide any method based only on the hash values. This observation stems from the fact that the high probability of bit corruption leads to unacceptably large number of broken hashes, which in turn stands in contradiction with the limitation for additional storage space.ududHowever, having loosened the initial constraints to some extent, the study group has proposed two methods that use only the hash values. The first method, based on a simple scheme of data subdivision in disjoint subsets, has been provided as a benchmark for other methods discussed in this report. The second method ("hypercube" method), introduced as a type of the wider class of clever-subdivision methods, is built on the concept of rewriting data-stream into a n-dimensional hypercube and calculating hash values for some particular (overlapping) sections of the cube.ududWe have obtained interesting results by combining hash value methods with error-correction techniques. The proposed framework, based on the BCH codes, appears to have promising properties, hence further research in this field is strongly recommended.ududAs a part of the report we have also presented features of secret sharing methods for the benefit of novel distributed data-storage scenarios. We have provided an overview of some interesting aspects of secret sharing techniques and several examples of possible applications.
机译:该项目的主要目标是获得先进的数学方法,以确保验证长期存储中保持所需数据完整性水平。第二个目的是提供评估数据丢失和恢复的方法。此外,我们为该问题提供了以下初始约束条件:额外存储空间的限制,所需数据完整性级别的最小阈值以及单位损坏的定义概率。 ud ud关于主要目标,该研究小组专注于基于哈希值的探索方法。已经表明,在PWPW建议的严格约束的情况下,不可能提供仅基于哈希值的任何方法。该观察结果来自以下事实:位损坏的可能性很高,导致散乱的哈希数过多,这是不可接受的,这又与附加存储空间的限制相矛盾。 ud ud但是,在某种程度上放松了初始约束,该研究小组提出了两种仅使用哈希值的方法。第一种方法基于不相交子集的数据细分的简单方案,已作为本报告中讨论的其他方法的基准。第二种方法(“超多维数据集”方法)作为一种更广泛的细分方法类型而引入,它基于以下概念:将数据流重写为n维超多维数据集并计算某些特定值(重叠)的哈希值 ud ud通过将哈希值方法与纠错技术相结合,我们获得了有趣的结果。基于BCH代码的提议框架似乎具有良好的性能,因此强烈建议对该领域进行进一步的研究。 ud ud作为报告的一部分,我们还介绍了秘密共享方法的功能,以利于新型分布式数据存储方案。我们概述了秘密共享技术的一些有趣方面,并列举了一些可能的应用示例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号