International audienceIn this paper, we show how to construct, from any linear code, a Proof of Retrievability (PoR) which features very low computation complexity on both the client (Verifier) and server (Prover) side, as well as small client storage (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [JK07] to fit into the framework of Paterson et al. [PSU13], from which our construction evolves. We thus provide a rigorous treatment of the security of our generic design; more precisely, we sharply bound the extraction failure of our protocol according to this security model. Next, we instantiate our formal construction with codes built from tensor-products as well as with Reed-Muller codes and lifted codes [GK...