메뉴 건너뛰기




Volumn , Issue , 2010, Pages 31-42

Deniable cloud storage: Sharing files via public-key deniability

Author keywords

cloud computing; cryptography; deniable encryption; deniable file system; steganographic file system

Indexed keywords

CLOUD COMPUTING; CLOUD STORAGES; COMPUTING RESOURCE; DENIABLE ENCRYPTION; FILE SYSTEMS; INTEGRAL PART; MINIMAL COST; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION SCHEME; SECURITY MECHANISM; SERVICE PROVIDER; STANDARD TOOLS; USER COLLABORATIONS;

EID: 78650197977     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866919.1866925     Document Type: Conference Paper
Times cited : (28)

References (31)
  • 3
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • Mihir Bellare and Phillip Rogaway. Optimal Asymmetric Encryption. In EUROCRYPT, pages 92-111, 1994.
    • (1994) EUROCRYPT , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0345058960 scopus 로고    scopus 로고
    • A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
    • E. Bresson, D. Catalano, and D. Pointcheval. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. In Advances in Cryptology - ASIACRYPT'03, pages 37-54, 2003.
    • (2003) Advances in Cryptology - ASIACRYPT'03 , pp. 37-54
    • Bresson, E.1    Catalano, D.2    Pointcheval, D.3
  • 6
    • 84958626761 scopus 로고    scopus 로고
    • Deniable Encryption
    • Adnvances in Cryptology - CRYPTO'97
    • R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable Encryption. In Adnvances in Cryptology - CRYPTO'97, volume 1294 of LNCS, pages 90-104, 1997.
    • (1997) LNCS , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 7
    • 34547218499 scopus 로고    scopus 로고
    • A Forward-Secure Public-Key Encryption Scheme
    • R. Canetti, S. Halevi, and J. Katz. A Forward-Secure Public-Key Encryption Scheme. Journal of Cryptology, 20(3):265-294, 2007.
    • (2007) Journal of Cryptology , vol.20 , Issue.3 , pp. 265-294
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 9
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System
    • I. Damgard and M. Jurik. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography (PKC'01), pages 119-136, 2001.
    • (2001) Public Key Cryptography (PKC'01) , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 11
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT'02, pages 548-566, 2002.
    • (2002) ASIACRYPT'02 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 13
    • 69749086390 scopus 로고    scopus 로고
    • A Method for Obtaining Deniable Public-key Encryption
    • M. Ibrahim. A Method for Obtaining Deniable Public-key Encryption. International Journal of Network Security, 8(1):1-9, 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.1 , pp. 1-9
    • Ibrahim, M.1
  • 15
    • 33646202553 scopus 로고    scopus 로고
    • Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
    • A. Kiayias and M. Yung. Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. In Progress in Cryptology - Mycrypt'05, pages 151-170, 2005.
    • (2005) Progress in Cryptology - Mycrypt'05 , pp. 151-170
    • Kiayias, A.1    Yung, M.2
  • 16
    • 38549145955 scopus 로고    scopus 로고
    • Practical Deniable Encryption
    • SPFSEM'08
    • M. Klonowski, P. Kubiak, and M. Kutylowski. Practical Deniable Encryption. In SPFSEM'08, volume 4910 of LNCS, pages 599-609, 2008.
    • (2008) LNCS , vol.4910 , pp. 599-609
    • Klonowski, M.1    Kubiak, P.2    Kutylowski, M.3
  • 18
    • 78650185562 scopus 로고    scopus 로고
    • Technical report, Indiana University
    • N. Mirzaei. Cloud Computing. Technical report, Indiana University, 2008.
    • (2008) Cloud Computing
    • Mirzaei, N.1
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT'99, pages 223-238, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 22
    • 78650218331 scopus 로고    scopus 로고
    • Amazon S3 http://aws.amazon.com/s3/.
    • Amazon S3
  • 24
    • 78650187236 scopus 로고    scopus 로고
    • Dropbox http://www.dropbox.com/.
    • Dropbox
  • 25
    • 78650197834 scopus 로고    scopus 로고
    • Truecrypt http://www.truecrypt.org/.
    • Truecrypt
  • 29
    • 78650180845 scopus 로고    scopus 로고
    • Spam Suspect Uses Google Docs; FBI Happy
    • Wired: "Spam Suspect Uses Google Docs; FBI Happy" http://www.wired.com/threatlevel/2010/ 04/cloud-warrant/.
    • Wired


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.