The cloud storage ciphertext retrieval scheme based on ORAM
暂无分享,去创建一个
[1] Hyunsoo Yoon,et al. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..
[2] Jinsheng Zhang,et al. S-ORAM: a segmentation-based oblivious RAM , 2014, AsiaCCS.
[3] Li,et al. Encrypted Storage and Its Retrieval in Cloud Storage Applications , 2010 .
[4] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[5] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[6] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[7] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[8] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[9] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[10] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[11] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[12] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[13] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Yannis Rouselakis,et al. Property Preserving Symmetric Encryption , 2012, EUROCRYPT.
[16] Ya Wang,et al. Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.
[17] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[18] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[19] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[20] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[21] Srinivas Devadas,et al. Enhancing Oblivious RAM Performance Using Dynamic Prefetching , 2014, IACR Cryptol. ePrint Arch..
[22] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[23] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[24] Steven J. Greenwald,et al. Proceedings of the 2001 workshop on New security paradigms , 2001 .
[25] Richard J. Lipton,et al. Proceedings of the tenth annual ACM symposium on Theory of computing , 1978 .
[26] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .