메뉴 건너뛰기




Volumn 7645 LNCS, Issue , 2012, Pages 305-319

Proof of possession for cloud storage via Lagrangian interpolation techniques

Author keywords

broadcast encryption; cloud computing; Lagrangian interpolation in the exponent; proof of retrievability; provable data possession

Indexed keywords

BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SYSTEMS; DISCRETE LOGARITHM PROBLEMS; LAGRANGIAN INTERPOLATION; PROOF OF RETRIEVABILITY; PROVABLE DATA POSSESSION;

EID: 84871533728     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34601-9_23     Document Type: Conference Paper
Times cited : (12)

References (18)
  • 2
    • 51849117195 scopus 로고    scopus 로고
    • Mr-pdp: Multiple-replica provable data possession
    • IEEE Computer Society
    • Curtmola, R., Khan, O., Burns, R.C., Ateniese, G.: Mr-pdp: Multiple-replica provable data possession. In: ICDCS, pp. 411-420. IEEE Computer Society (2008)
    • (2008) ICDCS , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.C.3    Ateniese, G.4
  • 3
    • 57049134700 scopus 로고    scopus 로고
    • Remote Integrity Check with Dishonest Storage Server
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 223-237. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 223-237
    • Chang, E.-C.1    Xu, J.2
  • 4
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of Storage from Homomorphic Identification Protocols
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from Homomorphic Identification Protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 5
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of Retrievability via Hardness Amplification
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of Retrievability via Hardness Amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.P.2    Wichs, D.3
  • 6
    • 70350389843 scopus 로고    scopus 로고
    • Enabling PublicVerifiability and DataDynamics for Storage Security in Cloud Computing
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wang, Q., Wang, C., Li, J., Ren,K., Lou, W.: Enabling PublicVerifiability and DataDynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 10
    • 79961227180 scopus 로고    scopus 로고
    • Provable data possession of resourceconstrained mobile devices in cloud computing
    • Yang, J., Wang, H., Wang, J., Tan, C., Yu, D.: Provable data possession of resourceconstrained mobile devices in cloud computing. JNW 6(7), 1033-1040 (2011)
    • (2011) JNW , vol.6 , Issue.7 , pp. 1033-1040
    • Yang, J.1    Wang, H.2    Wang, J.3    Tan, C.4    Yu, D.5
  • 11
    • 84871548781 scopus 로고    scopus 로고
    • Towards efficient provable data possession
    • ePrint Archive 2011
    • Xu, J., Chang, E.C.: Towards efficient provable data possession. IACR Cryptology ePrint Archive 2011, 574 (2011)
    • (2011) IACR Cryptology , pp. 574
    • Xu, J.1    Chang, E.C.2
  • 12
    • 81055144591 scopus 로고    scopus 로고
    • Delegable Provable Data Possession for Remote Data in the Clouds
    • Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. Springer, Heidelberg
    • Shen, S.T., Tzeng, W.G.: Delegable Provable Data Possession for Remote Data in the Clouds. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 93-111. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7043 , pp. 93-111
    • Shen, S.T.1    Tzeng, W.G.2
  • 14
    • 58349118819 scopus 로고    scopus 로고
    • Compact Proofs of Retrievability
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 15
    • 33745855807 scopus 로고    scopus 로고
    • Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
    • Boneh, D., Shen, E., Waters, B.: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 229-240. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3958 , pp. 229-240
    • Boneh, D.1    Shen, E.2    Waters, B.3
  • 16
    • 78650828289 scopus 로고    scopus 로고
    • Constant-Size Commitments to Polynomials and Their Applications
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 177-194
    • Kate, A.1    Zaverucha, G.M.2    Goldberg, I.3
  • 17
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.