Score:1

Zero-knowledge data storage with peace of mind. MAC/Encryption with two keys?

be flag

Background

Bob's goal: Receive data E = E(D) (encryption of D) from Alice that he knows for sure is encrypted and that he can't possibly decrypt (without brute force). This gives his data backup company peace of mind - no need to worry about what sorts of data he stores (copyright issues, etc.). When Bob sends E back to Alice, she can decrypt it with a key known only to her to recover D.

Solution/question

  • Alice has key A, known only to her.
  • Bob has nonce N that he sends to Alice, so Alice knows A and N.

Is it possible for Alice to encrypt her data D with both keys A and N and send E(D) to Bob, such that Bob can verify that N (plus some other data, in this case A, unknown to him) was used for the encryption?

In this case the problem is solved (as far as I can see), because now he can simply destroy the nonce N, and now he knows for sure he only has encrypted data in his possession that only Alice could possibly decrypt.

Other solutions?

Are there other ways? TLDR: The goal is zero-knowledge data storage with the added peace of mind of knowing you're only storing unrecoverable encrypted data. Is there a way around using a temporary nonce?

knaccc avatar
es flag
Someone could upload infringing materials to the storage service, and share the login/decryption keys in forums to allow other people to download and decrypt it. I don't think there is a way around this unless there is some kind of penalty if the login/decryption keys are leaked.
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.