Dynamic Provable Data Possession with batch-update verifiability
暂无分享,去创建一个
[1] Roberto Tamassia,et al. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.
[2] Roberto Tamassia,et al. Efficient integrity checking of untrusted network storage , 2008, StorageSS '08.
[3] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[4] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[5] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[6] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[7] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[8] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[9] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[10] Ngoc Tram Anh Nguyen. Fair and dynamic proofs of retrievability , 2014 .
[11] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[12] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[13] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[14] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.