Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves
暂无分享,去创建一个
[1] Douglas R. Stinson,et al. A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage , 2012, J. Math. Cryptol..
[2] Yihua Zhang,et al. Efficient dynamic provable possession of remote data via balanced update trees , 2013, ASIA CCS '13.
[3] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[4] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[5] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[7] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[8] Shucheng Yu,et al. Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.
[9] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[10] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[11] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[12] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[13] Oded Goldreich,et al. A Sample of Samplers - A Computational Perspective on Sampling (survey) , 1997, Electron. Colloquium Comput. Complex..
[14] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[17] Reza Curtmola,et al. Robust Dynamic Provable Data Possession , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[18] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[19] Jia Xu,et al. Towards efficient proofs of retrievability , 2012, ASIACCS '12.
[20] Thomas Icart,et al. How to Hash into Elliptic Curves , 2009, IACR Cryptol. ePrint Arch..
[21] Sanjit Chatterjee,et al. On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited , 2011, Discret. Appl. Math..
[22] 電子情報通信学会. IEICE transactions on communications electronics information and systems , 1991 .
[23] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[24] Christian Hanser,et al. On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[25] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[26] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[27] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.