This article presents a new approach to software-based Proof of Secure Erasure (PoSE) protocols. These protocols are designed to verify that a device has erased its memory within the protocol execution timeframe. The authors challenge the assumption that provers (devices) must be isolated during protocol execution to prevent them from receiving help from a network adversary. Instead, they propose a more realistic requirement that communication with the external conspirator is relatively slow. This approach is particularly relevant for low-end devices where deploying sophisticated protection methods may be too costly.

 

Publication date: 12 Jan 2024
Project Page: https://arxiv.org/pdf/2401.06626v1.pdf
Paper: https://arxiv.org/pdf/2401.06626