메뉴 건너뛰기




Volumn , Issue , 2011, Pages 290-295

An improved dynamic provable data possession model

Author keywords

Cloud computing; cryptographic hash; Dynamic Provable Data Possession; proofs of storage

Indexed keywords

CLIENT NEEDS; COMMUNICATION COMPLEXITY; COMPUTING DEMANDS; CRYPTOGRAPHIC HASH; FILE SIZES; HASH VALUE; OUTSOURCE; PROOFS OF STORAGE; SECRET VALUE;

EID: 80055101722     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCIS.2011.6045077     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 3
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A.Juels and B. Kaliski. PORs: Proofs of retrievability for large files. In CCS '07, pp.584-597, 2007.
    • (2007) CCS '07 , pp. 584-597
    • Juels, A.1    Kaliski, B.2
  • 4
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT '08, pp. 90- 107, 2008.
    • (2008) ASIACRYPT '08 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 5
    • 57049120189 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation. Technical Report 2008/175
    • ePrint Archive
    • K. Bowers, A. Juels, and A. Oprea. Proofs of retrievability: Theory and implementation. Technical Report 2008/175, Cryptology ePrint Archive, 2008.
    • (2008) Cryptology
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 6
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness application
    • TCC
    • Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness application. In TCC, vol.5444 of LNCS, pp. 109-127, 2009
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 7
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • ESORICS '09
    • Q.Wang, C.Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS '09, volume 5789 of LNCS, 2009.
    • (2009) LNCS , vol.5789
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 13
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Proc. of CT-RSA
    • R.Johnson, D.Molnar, D.song, and D.wagner. Homomorphic signature schemes. In Proc. of CT-RSA, volume 2271 of LNCS, pp. 244-262, 2002.
    • (2002) LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 14
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Advances in Cryptology - ASIACRYPT 2001
    • D Boneh, B Lynn, H Shacham. Short signatures from the weil pairing. ASIACCRYPT 2001. LNCS, vol. 2248, pp. 514-532, 2001. (Pubitemid 33371204)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 15
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • ASIACRYPT'09
    • G.Ateniese, S.Kamara, and J.Katz. Proofs of storage from homomorphic identification protocols. ASIACRYPT'09, LNCC, 2009.
    • (2009) LNCC
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 16
    • 85015281689 scopus 로고
    • Riemann's hypothesis and tests for primality
    • G. Miller. Riemann's hypothesis and tests for primality. In STOC, pages 234-239, 1975.
    • (1975) STOC , pp. 234-239
    • Miller, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.