| Literature DB >> 27363566 |
M Fujiwara1, A Waseda2, R Nojima2, S Moriai2, W Ogata3, M Sasaki1.
Abstract
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).Entities:
Year: 2016 PMID: 27363566 PMCID: PMC4929494 DOI: 10.1038/srep28988
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Schematic diagram of distributed storage with quantum key distribution and password-authenticated secret sharing scheme.
Figure 2Schematic view of the layer structure of our distributed storage system.
The whole system consists of two blocks, the application layer and the QKD platform. The QKD platform further consists of the two layers, the quantum layer and the key management layer, working as a secure key supply infrastructure. The password-authenticated secret sharing scheme is implemented in the application layer on which the data owner and the storage servers (STSs) are setup. In the QKD platform, the keys are generated in each QKD link in the quantum layer, pushed up to key management agents (KMAs) in the key management layer. The KMAs are in the trusted key relay nodes, store the keys, and if necessary, relay the keys. To support various applications, key supply agents (KSAs) are introduced at each KMA. In the key management layer, a key management server (KMS) is also located and carry out the centralized key management. Having requests from the data owner and the storage servers, the KSAs supply them the random number key streams.
Specification of QKD links.
| Protocol | Transmission | ||
|---|---|---|---|
| Length (km) | Loss (dB) | ||
| NEC-0 | BB84 with decoy | 50 (Spooled fiber NICT premise) | 10 |
| NEC-1 | BB84 with decoy | 22 (field installed 95% areal line) | 13 |
| Toshiba | BB84 with decoy | 45 (field installed 50% areal line) | 14.5 |
| NTT-NICT | DPS-QKD | 90 (field installed 50% areal line) | 28.6 |
| Gakushuin | CV-QKD | 2 (NICT premise) | 2 |
| SeQureNet | CV-QKD | 2 (NICT premise) | 2 |
Figure 3Processing time as a function of index of Mersenne prime for each phase.
Reg Registration phase (black). Pre: Pre-computation and communications phase (red). Rec: Data reconstruction phase (blue). Dependence of numbers of divided blocks on Mersenne prime size is shown by green dashed line. The sizes of secret data are, (a) 6955 bytes, (b) 13695 bytes, and (c) 46000 bytes respectively.