-
5
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
J. Yuan and S. Yu, "Proofs of retrievability with public verifiability and constant communication cost in cloud," Proceedings of the ACM ASIACCS-SCC'13, 2013.
-
Proceedings of the ACM ASIACCS-SCC'13, 2013
-
-
Yuan, J.1
Yu, S.2
-
6
-
-
58349118819
-
Compact proofs of retrievability
-
Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ser.
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ser. ASIACRYPT '08, Berlin, Heidelberg, May 2008, pp. 90-107.
-
ASIACRYPT '08, Berlin, Heidelberg, May 2008
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
7
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Proceedings of the 14th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
A. Juels and B. S. Kaliski, Jr., "Pors: proofs of retrievability for large files," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 584-597.
-
(2007)
CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
8
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, ser.
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, ser. TCC '09, Berlin, Heidelberg, 2009, pp. 109-127.
-
TCC '09, Berlin, Heidelberg, 2009
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
9
-
-
74049102823
-
Provable data possession at untrusted stores
-
Proceedings of the 14th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 598-609.
-
(2007)
CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
10
-
-
70249129465
-
Scalable and efficient provable data possession
-
Proceedings of the 4th international conference on Security and privacy in communication netowrks, ser. New York, NY, USA: ACM
-
G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th international conference on Security and privacy in communication netowrks, ser. SecureComm '08. New York, NY, USA: ACM, 2008.
-
(2008)
SecureComm '08
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
11
-
-
74049121230
-
Dynamic provable data possession
-
Proceedings of the 16th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 213-222.
-
(2009)
CCS '09
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
12
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
13
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Proceedings of the 18th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 491-500.
-
(2011)
CCS '11
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
14
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. New York, NY, USA: ACM
-
R. Di Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '12. New York, NY, USA: ACM, 2012, pp. 81-82.
-
(2012)
ASIACCS '12
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
15
-
-
84858201794
-
Secure and efficient proof of storage with deduplication
-
Proceedings of the second ACM conference on Data and Application Security and Privacy, ser. New York, NY, USA: ACM
-
Q. Zheng and S. Xu, "Secure and efficient proof of storage with deduplication," in Proceedings of the second ACM conference on Data and Application Security and Privacy, ser. CODASPY '12. New York, NY, USA: ACM, 2012, pp. 1-12.
-
(2012)
CODASPY '12
, pp. 1-12
-
-
Zheng, Q.1
Xu, S.2
-
16
-
-
84893588264
-
Security weakness in the proof of storage with deduplication
-
Report 2012/554
-
K. K. Youngjoo Shin, Junbeom Hur, "Security weakness in the proof of storage with deduplication," Cryptology ePrint Archive, Report 2012/554, 2012, http://eprint.iacr.org/.
-
(2012)
Cryptology ePrint Archive
-
-
Shin, K.K.Y.1
Hur, J.2
-
17
-
-
35048848152
-
Short signatures without random oracles
-
D. Boneh and X. Boyen, "Short signatures without random oracles," in EUROCRYPT, 2004, pp. 56-73.
-
(2004)
EUROCRYPT
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
18
-
-
0001174154
-
Polynomial Codes Over Certain Finite Fields
-
I. S. Reed and G. Solomon, "Polynomial Codes Over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp. 300-304, 1960.
-
(1960)
Journal of the Society for Industrial and Applied Mathematics
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
19
-
-
84893552054
-
Towards efficient provable data possession
-
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser.
-
X. Jia and C. Ee-Chien, "Towards efficient provable data possession," in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '12, Seoul, Korea, 2012.
-
ASIACCS '12, Seoul, Korea, 2012
-
-
Jia, X.1
Ee-Chien, C.2
-
20
-
-
0017018484
-
New directions in cryptography
-
Sep.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644-654, Sep. 1976.
-
(1976)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
21
-
-
78650838593
-
The static diffie-hellman problem
-
Report 2004/306
-
D. R. L. Brown and R. P. Gallant, "The static diffie-hellman problem," Cryptology ePrint Archive, Report 2004/306, 2004, http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive
-
-
Brown, D.R.L.1
Gallant, R.P.2
-
22
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
A. Kate, G. M. Zaverucha, and I. Goldberg, "Constant-size commitments to polynomials and their applications," in ASIACRYPT, 2010, pp. 177-194.
-
(2010)
ASIACRYPT
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
24
-
-
84893613995
-
-
jPBC
-
jPBC, "http://gas.dia.unisa.it/projects/jpbc/."
-
-
-
|