A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
暂无分享,去创建一个
Nenghai Yu | Sheng Zhong | Zhuo Hao | Nenghai Yu | Zhuo Hao | Sheng Zhong
[1] Gary L. Miller. Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..
[2] Underwood Dudley. Elementary Number Theory , 1978 .
[3] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[5] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[6] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[7] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[8] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[9] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[10] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[13] Charalampos Papamanthou,et al. Dynamic provable data possession , 2009, IACR Cryptology ePrint Archive.
[14] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[15] Reza Curtmola,et al. Robust remote data checking , 2008, StorageSS '08.
[16] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[17] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[18] Roberto Tamassia,et al. Efficient integrity checking of untrusted network storage , 2008, StorageSS '08.
[19] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[20] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[21] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[22] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[23] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[24] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[25] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[26] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[27] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[28] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[29] Nenghai Yu,et al. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[30] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[31] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[32] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[33] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.