data against key exposure in (Kapusta and Memmi,
2018b) or in (Kapusta and Memmi, 2018c). It be-
comes important to keep analyzing and comparing
these various scheme and determine in which situa-
tion one method is preferable over another one. We
believe PE-AONT is very likely best fitted as a tun-
able lightweight cipher since it is faster than the other
AONT algorithms.
Moreover, we would like to integrate PE-AONT
inside a complete distributed system protecting data
using an adaptable combination of fragmentation, en-
cryption, and dispersal (Kapusta et al., 2020).
7 CONCLUSION
PE-AONT: a fast fragmentation method combining
Partial Encryption with an AONT was introduced in
order to speed up the overall scheme performance
in a tun-able fashion. The desired ratio between
performance and protection levels can easily be ad-
justed by users with just two parameters to increase
performance and decrease protection or the other
way around. An experimental evaluation shows that
the algorithm achieves better performance than rele-
vant techniques including the most common way of
data fragmentation. As such, it can be chosen as a
lightweight cipher. Moreover, by carefully choosing
parameters values, it protects fragmented data against
key exposure (SAKE-secure) as long as an attacker
does not access to the entire set of fragments.
We now believe that PE-AONT is ready for seri-
ous consideration as a component and successfully be
integrated within modern distributed or transmission
systems where rapid protection is required.
REFERENCES
Bacis, E., De Capitani di Vimercati, S., Foresti, S.,
Paraboschi, S., Rosa, M., and Samarati, P. (2016).
Mix&slice: Efficient access revocation in the cloud.
In Proc. of the 2016 ACM SIGSAC Conf. on Computer
and Communications Security, CCS’16, pages 217—
-228, New York, NY, USA. ACM.
Bessani, A., Correia, M., Quaresma, B., Andr
´
e, F., and
Sousa, P. (2013). Depsky: Dependable and se-
cure storage in a cloud-of-clouds. Trans. Storage,
9(4):12:1–12:33.
Blakley, G. (1979). Safeguarding cryptographic keys. In
Proc. of the National Computer Conf. v48, pp313-317.
Boyko, V. (1999). On the security properties of OAEP as an
all-or-nothing transform. In Wiener, M. J., editor, Ad-
vances in Cryptology - CRYPTO’99, 19
th
Annual Int.
Cryptology Conf., Santa Barbara, CA, USA, August,
1999, Proc., LNCS 1666, P503-518. Springer.
Buchanan, W., Lanc, D., Ukwandu, E., Fan, L., and Rus-
sell, G. (2015). The future internet: A world of secret
shares. Future Internet, 7(4):445.
Chen, L., Laing, T. M., and Martin, K. M. (2017). Revisiting
and Extending the AONT-RS Scheme: A Robust Com-
putationally Secure Secret Sharing Scheme, pages 40–
57. Springer Int. Pub., Cham.
Esfahani, N. N., Cheriton, D. R., and Stinson, D. R.
(2021). Asymetric all-or-nothing transforms.
arXiv:2105.14988v1.
Kapusta, K. and Memmi, G. (2018a). Enhancing data
protection in a distributed storage environment us-
ing structure-wise fragmentation and dispersal of en-
crypted data. In 2018 17
th
IEEE Int. Conf. On Trust,
Security And Privacy In Computing And Communica-
tions (TrustCom/BigDataSE), pages 385–390.
Kapusta, K. and Memmi, G. (2018b). Poster: Circular aon:
A very fast scheme to protect encrypted data against
key exposure. In ACM CCS’18, Toronto, Canada.
Kapusta, K. and Memmi, G. (2018c). Selective all-or-
nothing transform: Protecting outsourced data against
key exposure. In Proc. of 10th Int. Symp, CSS, LNCS
11161, pages 181–193, Amalfi, Italy. Springer.
Kapusta, K., Rambaud, M., and Memmi, G. (2020). Revis-
iting shared data protection against key exposure. In
Sun, H., Shieh, S., Gu, G., and Ateniese, G., editors,
ASIA CCS ’20: The 15
th
ACM Asia Conference on
Computer and Communications Security, Taipei, Tai-
wan, October 5-9, 2020, pages 165–177. ACM.
Karame, G. O., Soriente, C., Lichota, K., and Capkun, S.
(2018). Securing cloud data under key exposure. IEEE
Trans. on Cloud Computing, pages 1–1.
Krawczyk, H. (1994). Secret sharing made short. In Proc. of
the 13
th
Annual International Cryptology Conference
on Advances in Cryptology, CRYPTO ’93, pages 136–
146, London, UK. Springer-Verlag.
Memmi, G., Kapusta, K., and Qiu, H. (2015). Data protec-
tion: Combining fragmentation, encryption, and dis-
persion. In 2015 International Conference on Cyber
Security of Smart Cities, Industrial Control System
and Communications (SSIC), pages 1–9.
Qiu, H., Kapusta, K., Lu, Z., Qiu, M., and Memmi, G.
(2019). All-or-nothing data protection for ubiquitous
communication: Challenges and perspectives. Inf.
Sci., 502:434–445.
Rabin, M. O. (1989). Efficient dispersal of information for
security, load balancing, and fault tolerance. J. ACM,
36(2):335–348.
Reed, I. S. and Solomon, G. (1960). Polynomial Codes
Over Certain Finite Fields. Journal of the Society for
Industrial and Applied Mathematics, 8(2):300–304.
Resch, J. K. and Plank, J. S. (2011). Aont-rs: Blending se-
curity and performance in dispersed storage systems.
In 9
th
USENIX Conf. on File and Storage Technolo-
gies, FAST’11, pages 14–14, Berkeley, CA, USA.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Stinson, D. R. (2001). Something about all or nothing
(transforms). Des. Codes Crypto., 22(2):133–138.
PE-AONT: Partial Encryption All or Nothing Transform
641