메뉴 건너뛰기




Volumn 8434 LNCS, Issue , 2014, Pages 330-345

Proofs of retrievability based on MRD codes

Author keywords

cloud storage; data integrity; MRD codes; Proofs of retrievability

Indexed keywords

CODES (SYMBOLS); MANAGEMENT; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84901660429     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-06320-1_25     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 2
    • 0026116647 scopus 로고
    • Maximum-rank array codes and their application to crisscross error correction
    • Roth, R.: Maximum-rank array codes and their application to crisscross error correction. IEEE Transactions on Information Theory 32(2), 328-336 (1991)
    • (1991) IEEE Transactions on Information Theory , vol.32 , Issue.2 , pp. 328-336
    • Roth, R.1
  • 3
    • 0021941233 scopus 로고
    • Theory of code with maximum rank distance
    • Gabidulin, E.: Theory of code with maximum rank distance. Problems of Information Transmission 21(1), 1-12 (1985)
    • (1985) Problems of Information Transmission , vol.21 , Issue.1 , pp. 1-12
    • Gabidulin, E.1
  • 4
    • 0009068065 scopus 로고
    • Bilinear forms over a finite field, with applications to coding theory
    • Delsarte, P.: Bilinear forms over a finite field, with applications to coding theory. Journal of Combinatorial Theory, Series A 25(3), 226-241 (1978)
    • (1978) Journal of Combinatorial Theory, Series A , vol.25 , Issue.3 , pp. 226-241
    • Delsarte, P.1
  • 6
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 7
    • 51349158835 scopus 로고    scopus 로고
    • Error and erasure correcting algorithms for rank codes
    • Gabidulin, E., Pilipchuk, N.: Error and erasure correcting algorithms for rank codes. Designs, Codes and Cryptography 49(1-3), 105-122 (2008)
    • (2008) Designs, Codes and Cryptography , vol.49 , Issue.1-3 , pp. 105-122
    • Gabidulin, E.1    Pilipchuk, N.2
  • 9
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive, Report 2004/332 (2004)
    • (2004) IACR Cryptology ePrint Archive
    • Shoup, V.1
  • 10
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • Ahamad, M., Rodrigues, L. (eds.) IEEE Computer Society, Los Alamitos
    • Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Ahamad, M., Rodrigues, L. (eds.) Proceedings of ICDCS 2006, p. 12. IEEE Computer Society, Los Alamitos (2006)
    • (2006) Proceedings of ICDCS 2006 , pp. 12
    • Schwarz, T.1    Miller, E.2
  • 11
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 13
    • 84901649395 scopus 로고    scopus 로고
    • Proofs of data possession and retrievability based on MRD codes
    • Report 2013/789
    • Han, S., Liu, S., Chen, K., Gu, D.: Proofs of data possession and retrievability based on MRD codes. IACR Cryptology ePrint Archive, Report 2013/789 (2013)
    • (2013) IACR Cryptology ePrint Archive
    • Han, S.1    Liu, S.2    Chen, K.3    Gu, D.4
  • 14
    • 84655169995 scopus 로고    scopus 로고
    • An authentication code against pollution attacks in network coding
    • Oggier, F., Fathi, H.: An authentication code against pollution attacks in network coding. IEEE/ACM Transactions on Networking (TON) 19(6), 1587-1596 (2011)
    • (2011) IEEE/ACM Transactions on Networking (TON) , vol.19 , Issue.6 , pp. 1587-1596
    • Oggier, F.1    Fathi, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.