메뉴 건너뛰기




Volumn , Issue , 2015, Pages 3-12

Entangled encodings and data entanglement

Author keywords

Cloud storage; Data entanglement; Secure computation

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DIGITAL STORAGE;

EID: 84959310213     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2732516.2732524     Document Type: Conference Paper
Times cited : (3)

References (32)
  • 4
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • G. Ateniese, S. Kamara, and J. Katz. Proofs of storage from homomorphic identification protocols. In ASIACRYPT, pages 319-333, 2009.
    • (2009) ASIACRYPT , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 6
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
    • J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In PODC, pages 201-209, 1989.
    • (1989) PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 7
    • 84856466374 scopus 로고    scopus 로고
    • (Leveled) fully homomorphic encryption without bootstrapping
    • to appear
    • Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (Leveled) Fully Homomorphic Encryption without Bootstrapping. In ITCS, page to appear, 2012.
    • (2012) ITCS
    • Brakerski, Z.1    Gentry, C.2    Vaikuntanathan, V.3
  • 8
    • 80955132201 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (standard) LWE
    • Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from (standard) LWE. In FOCS, pages 97-106, 2011.
    • (2011) FOCS , pp. 97-106
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 10
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUROCRYPT, pages 453-469, 2000.
    • (2000) EUROCRYPT , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 11
    • 84873949927 scopus 로고    scopus 로고
    • Rate-limited secure function evaluation: Definitions and constructions
    • Ö. Dagdelen, P. Mohassel, and D. Venturi. Rate-limited secure function evaluation: Definitions and constructions. In PKC, pages 461-478, 2013.
    • (2013) PKC , pp. 461-478
    • Dagdelen, Ö.1    Mohassel, P.2    Venturi, D.3
  • 12
    • 85026942567 scopus 로고    scopus 로고
    • A multi-party protocol for privacy-preserving cooperative linear systems of equations
    • To appear
    • Ö. Dagdelen and D. Venturi. A multi-party protocol for privacy-preserving cooperative linear systems of equations. In BalkancryptSec, 2014. To appear.
    • (2014) BalkancryptSec
    • Dagdelen, Ö.1    Venturi, D.2
  • 13
    • 77958056591 scopus 로고    scopus 로고
    • Leakage-resilient storage
    • F. Davì, S. Dziembowski, and D. Venturi. Leakage-resilient storage. In SCN, pages 121-137, 2010.
    • (2010) SCN , pp. 121-137
    • Davì, F.1    Dziembowski, S.2    Venturi, D.3
  • 14
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Y. Dodis, S. P. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In TCC, pages 109-127, 2009.
    • (2009) TCC , pp. 109-127
    • Dodis, Y.1    Vadhan, S.P.2    Wichs, D.3
  • 15
    • 84946827596 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosen-ciphertext attacks
    • P.-A. Fouque and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In ASIACRYPT, pages 351-368, 2001.
    • (2001) ASIACRYPT , pp. 351-368
    • Fouque, P.-A.1    Pointcheval, D.2
  • 16
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fact-track multiparty computations with applications to threshold cryptography
    • R. Gennaro, M. O. Rabin, and T. Rabin. Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In PODC, pages 101-111, 1998.
    • (1998) PODC , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 17
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 19
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229, 1987.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 20
    • 84945966781 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and secure set-intersection from algebraic prfs
    • 2015
    • C. Hazay. Oblivious polynomial evaluation and secure set-intersection from algebraic prfs. IACR Cryptology ePrint Archive, 2015:4, 2015.
    • (2015) IACR Cryptology EPrint Archive , pp. 4
    • Hazay, C.1
  • 21
    • 84924354505 scopus 로고    scopus 로고
    • Efficient oblivious polynomial evaluation with simulation-based security
    • 2009
    • C. Hazay and Y. Lindell. Efficient oblivious polynomial evaluation with simulation-based security. IACR Cryptology ePrint Archive, 2009:459, 2009.
    • (2009) IACR Cryptology EPrint Archive , pp. 459
    • Hazay, C.1    Lindell, Y.2
  • 22
    • 74049103479 scopus 로고    scopus 로고
    • PoRs: Proofs of retrievability for large files
    • A. Juels and B. S. K. Jr. PoRs: proofs of retrievability for large files. In ACM CCS, pages 584-597, 2007.
    • (2007) ACM CCS , pp. 584-597
    • Juels, A.1
  • 23
    • 33745868262 scopus 로고    scopus 로고
    • Efficient polynomial operations in the shared-coefficients setting
    • P. Mohassel and M. K. Franklin. Efficient polynomial operations in the shared-coefficients setting. In PKC, pages 44-57, 2006.
    • (2006) PKC , pp. 44-57
    • Mohassel, P.1    Franklin, M.K.2
  • 24
    • 33748605569 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • M. Naor and G. N. Rothblum. The complexity of online memory checking. In FOCS, pages 573-584, 2005.
    • (2005) FOCS , pp. 573-584
    • Naor, M.1    Rothblum, G.N.2
  • 25
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 26
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • R. L. Rivest. All-or-nothing encryption and the package transform. In FSE, pages 210-218, 1997.
    • (1997) FSE , pp. 210-218
    • Rivest, R.L.1
  • 27
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90-107, 2008.
    • (2008) ASIACRYPT , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 29
    • 84872103252 scopus 로고    scopus 로고
    • Iris: A scalable cloud file system with efficient integrity checks
    • E. Stefanov, M. van Dijk, A. Juels, and A. Oprea. Iris: a scalable cloud file system with efficient integrity checks. In ACSAC, pages 229-238, 2012.
    • (2012) ACSAC , pp. 229-238
    • Stefanov, E.1    Van Dijk, M.2    Juels, A.3    Oprea, A.4
  • 31
    • 0035754863 scopus 로고    scopus 로고
    • Tangler: A censorship-resistant publishing system based on document entanglements
    • M. Waldman and D. Mazières. Tangler: A censorship-resistant publishing system based on document entanglements. In ACM CCS, pages 126-135, 2001.
    • (2001) ACM CCS , pp. 126-135
    • Waldman, M.1    Mazières, D.2
  • 32
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.