Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
暂无分享,去创建一个
Genqing Bian | Jinyong Chang | Yanyan Ji | Bilin Shao | Yanyan Ji | Bilin Shao | Jinyong Chang | G. Bian
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] William Yurcik,et al. The evolution of storage service providers: techniques and challenges to outsourcing storage , 2005, StorageSS '05.
[3] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] Charalampos Papamanthou,et al. Dynamic provable data possession , 2009, IACR Cryptology ePrint Archive.
[6] Flavio D. Garcia,et al. A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.
[7] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[8] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[11] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[12] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[13] Fenghua Li,et al. Certificateless public auditing for data integrity in the cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[14] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[15] Yang Li,et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead , 2017, Science China Information Sciences.
[16] Kim-Kwang Raymond Choo,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud , 2017, Appl. Math. Comput..
[17] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensics , 2013, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[18] Dongmin Kim,et al. Certificateless Public Auditing Protocol with Constant Verification Time , 2017, Secur. Commun. Networks.
[19] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[20] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[21] Jinyong Chang,et al. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..
[22] Huaqun Wang,et al. Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.
[23] Yongjian Liao,et al. Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud , 2019, IEEE Access.
[24] Fei Wang,et al. RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.
[25] Jiguo Li,et al. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage , 2019, IEEE Transactions on Cloud Computing.