Timed-Release of Self-Emerging Data Using Distributed Hash Tables
暂无分享,去创建一个
[1] Peng Ning,et al. Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks , 2012, Ad Hoc Networks.
[2] Jörg Schwenk,et al. Modelling Time for Authenticated Key Exchange Protocols , 2014, ESORICS.
[3] Atsushi Fujioka,et al. Strong Security Notions for Timed-Release Public-Key Encryption Revisited , 2011, ICISC.
[4] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[5] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[6] David Moore,et al. Replication Strategies for Highly Available Peer-to-Peer Storage , 2002, Future Directions in Distributed Computing.
[7] Sunoo Park. On Time and Order in Multiparty Computation , 2015 .
[8] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.
[9] George J. Pappas,et al. Gradually Releasing Private Data under Differential Privacy , 2015 .
[10] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[11] Dan Feng,et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[12] Hideki Imai,et al. Time-Specific Encryption from Forward-Secure Encryption , 2012, SCN.
[13] Markus Dürmuth,et al. Timed revocation of user data: long expiration times from existing infrastructure , 2012, WPES '12.
[14] Tibor Jager,et al. How to build time-lock encryption , 2018, Designs, Codes and Cryptography.
[15] Ian F. Blake,et al. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing , 2004, IACR Cryptol. ePrint Arch..
[16] Markus Jakobsson,et al. Timed Release of Standard Digital Signatures , 2002, Financial Cryptography.
[17] Apostolis Zarras,et al. Neuralyzer: Flexible Expiration Times for the Revocation of Online Data , 2016, CODASPY.
[18] Jung Hee Cheon,et al. Provably Secure Timed-Release Public Key Encryption , 2008, TSEC.
[19] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[20] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[23] Marco Casassa Mont,et al. The HP time vault service: exploiting IBE for timed release of confidential information , 2003, WWW '03.