-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACMConference on Computer and Communications Security. ACM, New York (2007)
-
(2007)
ACMConference on Computer and Communications Security
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM, New York
-
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. 4th Intl. Conf. on Security and Privacy in Communication Netowrks (SecureComm 2008), pp. 1-10. ACM, New York (2008)
-
(2008)
Proc. 4th Intl. Conf. on Security and Privacy in Communication Netowrks (SecureComm
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
3
-
-
84983104598
-
On defining proofs of knowledge
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
4
-
-
57049120189
-
Proofs of retrievability: Theory and implementation
-
Technical Report 2008/175, Cryptology ePrint Archive
-
Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Technical Report 2008/175, Cryptology ePrint Archive (2008)
-
(2008)
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
5
-
-
70350681128
-
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 109-127. Springer, Heidelberg (2009)
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
-
-
-
6
-
-
74049121230
-
-
Erway, C., Papamanthou, C., Kupcu, A., Tamassia, R.: Dynamic provable data possession. In: ACM Conf. on Computer and Communications Security (to appear, 2009). Available as Cryptology ePrint Archive, Report 2008/432
-
Erway, C., Papamanthou, C., Kupcu, A., Tamassia, R.: Dynamic provable data possession. In: ACM Conf. on Computer and Communications Security (to appear, 2009). Available as Cryptology ePrint Archive, Report 2008/432
-
-
-
-
7
-
-
0024135240
-
Zero knowledge proofs of identity
-
Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. J. Cryptology 1(2), 77-94 (1988)
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
8
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for NP. J. Cryptology 9(3), 167-190 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
9
-
-
33746347629
-
A verifiable secret shuffle of homomorphic encryptions
-
Technical Report 2005/246, IACR ePrint Cryptography Archive
-
Groth, J.: A verifiable secret shuffle of homomorphic encryptions. Technical Report 2005/246, IACR ePrint Cryptography Archive (2005)
-
(2005)
-
-
Groth, J.1
-
10
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Guillou, L., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123-128. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.-J.2
-
12
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. Cryptology 16(3), 143-184 (2003)
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
13
-
-
33748605569
-
The complexity of online memory checking
-
IEEE Computer Society, Los Alamitos
-
Naor, M., Rothblum, G.: The complexity of online memory checking. In: IEEE Symposium on Foundations of Computer Science, pp. 573-584. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symposium on Foundations of Computer Science
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.2
-
14
-
-
58349118819
-
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, 5350, pp. 90-107. Springer, Heidelberg (2008), Full version http://eprint.iacr.org
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008), Full version http://eprint.iacr.org
-
-
-
-
15
-
-
0004746654
-
On the security of a practical identification scheme
-
Shoup, V.: On the security of a practical identification scheme. J. Cryptology 12(4), 247-260 (1999)
-
(1999)
J. Cryptology
, vol.12
, Issue.4
, pp. 247-260
-
-
Shoup, V.1
|