Proofs of Data Possession and Retrievability Based on MRD Codes
暂无分享,去创建一个
Dawu Gu | Kefei Chen | Shuai Han | Shengli Liu | Dawu Gu | Shengli Liu | Shuai Han | Kefei Chen
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[3] Martin Bossert,et al. A Fast Linearized Euclidean Algorithm for DecodingGabidulin CodesdeA Fast Linearized Euclidean Algorithm for Decoding Gabidulin Codes , 2010 .
[4] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[5] Moni Naor,et al. The Complexity of Online Memory Checking , 2005, FOCS.
[6] Ron M. Roth,et al. Author's Reply to Comments on 'Maximum-rank array codes and their application to crisscross error correction' , 1991, IEEE Trans. Inf. Theory.
[7] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[8] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[9] Serge Vaudenay,et al. Capacity and Data Complexity in Multidimensional Linear Attack , 2015, CRYPTO.
[10] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[11] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[12] Xuejia Lai,et al. Revisiting key schedule’s diffusion in relation with round function’s diffusion , 2014, Des. Codes Cryptogr..
[13] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[14] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[15] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[16] Pierre Loidreau,et al. Properties of codes in rank metric , 2006, ArXiv.
[17] Philippe Delsarte,et al. Bilinear Forms over a Finite Field, with Applications to Coding Theory , 1978, J. Comb. Theory A.
[18] Reihaneh Safavi-Naini,et al. Linear Authentication Codes: Bounds and Constructions , 2001, INDOCRYPT.
[19] Ernst M. Gabidulin,et al. Error and erasure correcting algorithms for rank codes , 2008, Des. Codes Cryptogr..