Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
暂无分享,去创建一个
Genqing Bian | Jinyong Chang | Yanyan Ji | Bilin Shao | Yanyan Ji | Bilin Shao | Jinyong Chang | G. Bian
[1] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[2] Genqing Bian,et al. Comment on “A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding” , 2020, IEEE Transactions on Parallel and Distributed Systems.
[3] Jinyong Chang,et al. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..
[4] Fei Wang,et al. RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.
[5] Jiguo Li,et al. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage , 2019, IEEE Transactions on Cloud Computing.
[6] Fan Wu,et al. An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics , 2018, SpaCCS.
[7] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[8] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[9] Weizhe Zhang,et al. Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing , 2020, IEEE Transactions on Cloud Computing.
[10] Genqing Bian,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited , 2020, Appl. Math. Comput..
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Baoyuan Kang,et al. ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification , 2018, Secur. Commun. Networks.
[13] M. Anwar Hasan,et al. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Flavio D. Garcia,et al. A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.
[16] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..