메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 319-333

Proofs of storage from homomorphic identification protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; COMMUNICATION COMPLEXITY; HOMOMORPHIC PROPERTY; IDENTIFICATION PROTOCOL; INTERACTIVE PROTOCOLS; LINEAR COMBINATIONS; MULTIPLE MESSAGES; PUBLIC KEYS; RANDOM ORACLE MODEL;

EID: 72449185582     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_19     Document Type: Conference Paper
Times cited : (246)

References (15)
  • 3
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 4
    • 57049120189 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation
    • Technical Report 2008/175, Cryptology ePrint Archive
    • Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Technical Report 2008/175, Cryptology ePrint Archive (2008)
    • (2008)
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 5
    • 70350681128 scopus 로고    scopus 로고
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 109-127. Springer, Heidelberg (2009)
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
  • 6
    • 74049121230 scopus 로고    scopus 로고
    • Erway, C., Papamanthou, C., Kupcu, A., Tamassia, R.: Dynamic provable data possession. In: ACM Conf. on Computer and Communications Security (to appear, 2009). Available as Cryptology ePrint Archive, Report 2008/432
    • Erway, C., Papamanthou, C., Kupcu, A., Tamassia, R.: Dynamic provable data possession. In: ACM Conf. on Computer and Communications Security (to appear, 2009). Available as Cryptology ePrint Archive, Report 2008/432
  • 7
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. J. Cryptology 1(2), 77-94 (1988)
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 8
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for NP
    • Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for NP. J. Cryptology 9(3), 167-190 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kahan, A.2
  • 9
    • 33746347629 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • Technical Report 2005/246, IACR ePrint Cryptography Archive
    • Groth, J.: A verifiable secret shuffle of homomorphic encryptions. Technical Report 2005/246, IACR ePrint Cryptography Archive (2005)
    • (2005)
    • Groth, J.1
  • 10
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
    • Guillou, L., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123-128. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 123-128
    • Guillou, L.1    Quisquater, J.-J.2
  • 12
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. Cryptology 16(3), 143-184 (2003)
    • (2003) J. Cryptology , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 13
    • 33748605569 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • IEEE Computer Society, Los Alamitos
    • Naor, M., Rothblum, G.: The complexity of online memory checking. In: IEEE Symposium on Foundations of Computer Science, pp. 573-584. IEEE Computer Society, Los Alamitos (2005)
    • (2005) IEEE Symposium on Foundations of Computer Science , pp. 573-584
    • Naor, M.1    Rothblum, G.2
  • 14
    • 58349118819 scopus 로고    scopus 로고
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, 5350, pp. 90-107. Springer, Heidelberg (2008), Full version http://eprint.iacr.org
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008), Full version http://eprint.iacr.org
  • 15
    • 0004746654 scopus 로고    scopus 로고
    • On the security of a practical identification scheme
    • Shoup, V.: On the security of a practical identification scheme. J. Cryptology 12(4), 247-260 (1999)
    • (1999) J. Cryptology , vol.12 , Issue.4 , pp. 247-260
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.