메뉴 건너뛰기




Volumn 107, Issue , 2018, Pages 113-124

Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures

Author keywords

Fully homomorphic encryption; Merkle tree; Streaming authenticated data structures; Verifiable data streaming

Indexed keywords

AUTHENTICATION; DATA STRUCTURES; DIGITAL STORAGE; FORESTRY; TREES (MATHEMATICS);

EID: 85042177655     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2018.01.014     Document Type: Article
Times cited : (154)

References (30)
  • 1
    • 84940720283 scopus 로고    scopus 로고
    • New models for efficient authenticated dictionaries
    • Atighehchi, K., Bonnecaze, A., Risterucci, G., New models for efficient authenticated dictionaries. Comput. Secur. 53 (2015), 203–214.
    • (2015) Comput. Secur. , vol.53 , pp. 203-214
    • Atighehchi, K.1    Bonnecaze, A.2    Risterucci, G.3
  • 3
    • 85032625319 scopus 로고    scopus 로고
    • Don't trust the cloud, verify: integrity and consistency for cloud object stores
    • Brandenburger, M., Cachin, C., Kneevic, N., Don't trust the cloud, verify: integrity and consistency for cloud object stores. ACM Trans. Priv. Secur. 20:3 (2017), 1–11.
    • (2017) ACM Trans. Priv. Secur. , vol.20 , Issue.3 , pp. 1-11
    • Brandenburger, M.1    Cachin, C.2    Kneevic, N.3
  • 6
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • Fiore, D., Gennaro, R., Publicly verifiable delegation of large polynomials and matrix computations, with applications. ACM Conference on Computer and Communications Security, 2012, 501–512.
    • (2012) ACM Conference on Computer and Communications Security , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 7
    • 85042177781 scopus 로고    scopus 로고
    • Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
    • Gao, C., Chen, Q., Li, X., Xia, S., Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 10.1007/s10586-017-1649-y.
    • (2018) Cluster Comput.
    • Gao, C.1    Chen, Q.2    Li, X.3    Xia, S.4
  • 8
    • 79958255284 scopus 로고    scopus 로고
    • Efficient authenticated data structures for graph connectivity and geometric search problems
    • Goodrich, M.T., Tamassia, R., Triandopoulos, N., Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica (New York) 60:3 (2011), 505–552.
    • (2011) Algorithmica (New York) , vol.60 , Issue.3 , pp. 505-552
    • Goodrich, M.T.1    Tamassia, R.2    Triandopoulos, N.3
  • 9
    • 85020050894 scopus 로고    scopus 로고
    • Insight of the protection for data security under selective opening attacks
    • Huang, Z.G., Liu, S.L., Mao, X.P., Chen, K.F., Li, J., Insight of the protection for data security under selective opening attacks. Inf. Sci. 412 (2017), 223–241.
    • (2017) Inf. Sci. , vol.412 , pp. 223-241
    • Huang, Z.G.1    Liu, S.L.2    Mao, X.P.3    Chen, K.F.4    Li, J.5
  • 10
    • 84973111531 scopus 로고    scopus 로고
    • A survey of security issues for cloud computing
    • Khan, M.A., A survey of security issues for cloud computing. J. Network Comput. Appl. 71 (2016), 11–29.
    • (2016) J. Network Comput. Appl. , vol.71 , pp. 11-29
    • Khan, M.A.1
  • 11
    • 84959329572 scopus 로고    scopus 로고
    • Efficient verifiable data streaming
    • Kim, K.S., Jeong, I.R., Efficient verifiable data streaming. Secur. Commun. Network. 8:18 (2016), 4013–4018.
    • (2016) Secur. Commun. Network. , vol.8 , Issue.18 , pp. 4013-4018
    • Kim, K.S.1    Jeong, I.R.2
  • 14
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Li, J., Zhang, Y.H., Chen, X.F., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
    • (2018) Comput. Secur. , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.H.2    Chen, X.F.3    Xiang, Y.4
  • 19
    • 0033733822 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Naor, M., Nissim, K., Certificate revocation and certificate update. IEEE J. Sel. Area. Commun. 18:4 (2000), 561–570.
    • (2000) IEEE J. Sel. Area. Commun. , vol.18 , Issue.4 , pp. 561-570
    • Naor, M.1    Nissim, K.2
  • 23
    • 85006173593 scopus 로고    scopus 로고
    • Comments on “identity-based distributed provable data possession in multicloud storage”
    • Peng, S., Zhou, F.C., Xu, J., Xu, Z.F., Comments on “identity-based distributed provable data possession in multicloud storage”. IEEE Trans. Services Comput. 9:6 (2016), 996–998.
    • (2016) IEEE Trans. Services Comput. , vol.9 , Issue.6 , pp. 996-998
    • Peng, S.1    Zhou, F.C.2    Xu, J.3    Xu, Z.F.4
  • 24
  • 25
    • 84949982856 scopus 로고    scopus 로고
    • Veristream - a framework for verifiable data streaming
    • Schoder, D., Simkin, M., Veristream - a framework for verifiable data streaming. Proceedings of FC 2015, 2015, 548–566.
    • (2015) Proceedings of FC 2015 , pp. 548-566
    • Schoder, D.1    Simkin, M.2
  • 27
    • 84945431187 scopus 로고    scopus 로고
    • Dynamic remote data auditing for securing big data storage in cloud computing
    • Sookhak, M., Gani, A., Khan, M.K., Buyya, R., Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380 (2014), 101–116.
    • (2014) Inf. Sci. , vol.380 , pp. 101-116
    • Sookhak, M.1    Gani, A.2    Khan, M.K.3    Buyya, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.