Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification
暂无分享,去创建一个
Yi Mu | Guomin Yang | Willy Susilo | Yannan Li | Jianbing Ni | Yong Yu | Jiawei Yuan | Shucheng Yu
[1] R. Ramesh,et al. A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2016 .
[2] Shucheng Yu,et al. Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.
[3] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[4] Victor Shoup,et al. A computational introduction to number theory and algebra , 2005 .
[5] Harikesh Pandey,et al. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication , 2017 .
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[9] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[10] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[13] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[14] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[15] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[16] Jia Xu,et al. Towards efficient proofs of retrievability , 2012, ASIACCS '12.
[17] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[18] Shucheng Yu,et al. Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification , 2015, IEEE Trans. Inf. Forensics Secur..
[19] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[20] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[22] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[23] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[24] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[25] Simon Yuill. Concurrent Versions System , 2008 .
[26] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[27] Shucheng Yu,et al. Efficient public integrity checking for cloud data sharing with multi-user modification , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.