A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications
暂无分享,去创建一个
Nesrine Kaaniche | Maryline Laurent-Maknavicius | Ethmane El Moustaine | M. Laurent-Maknavicius | N. Kaaniche
[1] Ronald L. Rivest,et al. Hourglass schemes: how to prove that cloud files are encrypted , 2012, CCS.
[2] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[3] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[4] Paulo S. L. M. Barreto,et al. Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..
[5] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[6] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..
[7] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[8] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[9] Jia Xu,et al. Towards efficient proofs of retrievability , 2012, ASIACCS '12.
[10] Miroslaw Kutylowski,et al. Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques , 2012, NSS.
[11] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[12] Ronald L. Rivest,et al. How to tell if your cloud files are vulnerable to drive crashes , 2011, CCS '11.
[13] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[14] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[15] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[16] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[17] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[18] Jacques Stern,et al. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order , 2006, Journal of Cryptology.