Secure Deduplication in a Multiple Group Signature Setting
暂无分享,去创建一个
[1] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[2] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[3] Daniel Slamanig,et al. Cryptography for Security and Privacy in Cloud Computing , 2013 .
[4] Fuchun Guo,et al. BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.
[5] Jia Xu,et al. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.
[6] Kwangjo Kim,et al. Security weakness in the Proof of Storage with Deduplication , 2012, IACR Cryptol. ePrint Arch..
[7] Dongdai Lin,et al. Unlinkable Randomizable Signature and Its Application in Group Signature , 2007, Inscrypt.
[8] Martín Abadi,et al. Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..
[9] Mehmet Sabir Kiraz,et al. Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing , 2016, IACR Cryptol. ePrint Arch..
[10] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[11] Mihir Bellare,et al. Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.
[12] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[13] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[14] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[15] Nobuo Funabiki,et al. Revocable Group Signature Schemes with Constant Costs for Signing and Verifying , 2010 .
[16] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[17] Moti Yung,et al. Fair Traceable Multi-Group Signatures , 2008, Financial Cryptography.
[18] Cong Wang,et al. Enabling Encrypted Cloud Media Center with Secure Deduplication , 2015, AsiaCCS.
[19] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[20] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[21] Shucheng Yu,et al. Secure and constant cost public cloud storage auditing with deduplication , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[22] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[23] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[24] Lise Getoor,et al. Deduplication and Group Detection using Links , 2004 .
[25] Fabio Martinelli,et al. Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers , 2016, DPM/QASA@ESORICS.
[26] Refik Molva,et al. ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[27] Aayush Agarwal,et al. A Survey of Group Signature Technique, its Applications and Attacks , 2013 .
[28] Refik Molva,et al. PerfectDedup: Secure Data Deduplication , 2015, DPM/QASA@ESORICS.
[29] Ghassan O. Karame,et al. Transparent Data Deduplication in the Cloud , 2015, CCS.
[30] Yucheng Zhang,et al. SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management , 2015, 2015 31st Symposium on Mass Storage Systems and Technologies (MSST).