Distributed fingerprints and secure information dispersal

We present a solution to the problem of information integrity protection in distributed systems which is robust against malicious parties, is space and communication efficient, and uses cryptography in a minimal way, Our solution builds on Rabin’s information dispersal algorithm (IDA). While the IDA scheme is able to deal with missing pieces of information, here we solve the more general secure information dispersal problem, in which recovery of information is possible even against modification of information shares by a possibly malicious adversary. Previous solutions to this problem suffer from space and communication blowup, or use costly cryptographic tools that limit the usefulness of the scheme. In contrast, our scheme uses crypt ography in a “minimal” way. It gets rid of the need of private and public key systems and, act ually, requires no secret keys at all. It permits recovery of the distributed information by any party in the system, and at the same time prevents any modification or loss of informat ion, as long as Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and Its date appear, and notice IS given that copying is by permission of the Association for Computtng Mach! nery. To copy otherwise, or to republlsh, requires a fee and/or specific permission. 12th ACM Symposium on Pnncl~les on Dlstrlbuted Computing, Ithaca NY 01993 ACM 0.89791 .613.1 /93/0008 /0207 .,.. $1 ,50 a honest majority of parties exist. The proposed solution is space optimal and flexible enough to replace the basic IDA algorithm in most applications that contemplate general faults. Our solution introduces a new cryptographic tool called distributed fingerprints, which consists of public fingerprints for data integrity having the “paradoxical” property that everyone in the system can compute them (using the same function and no secrets!) but no one can forge them. Distributed fingerprints may replace some of the (integrity) functions provided by signatures in distributed systems, but at a lower cost.