Hourglass schemes: how to prove that cloud files are encrypted
暂无分享,去创建一个
Ronald L. Rivest | Marten van Dijk | Ari Juels | Alina Oprea | Emil Stefanov | Nikos Triandopoulos | A. Juels | R. Rivest | Emil Stefanov | Alina Oprea | Nikos Triandopoulos
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] References , 1971 .
[3] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[4] Moni Naor,et al. Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.
[5] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[6] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[7] Ari Juels,et al. $evwu Dfw , 1998 .
[8] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[9] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[10] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[11] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[12] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[13] Moni Naor,et al. Pebbling and Proofs of Work , 2005, CRYPTO.
[14] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[15] David Naccache,et al. Alien vs. Quine , 2007, IEEE Security & Privacy.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[17] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[18] Sharon Goldberg,et al. Rationality and traffic attraction: incentives for honest path announcements in bgp , 2008, SIGCOMM '08.
[19] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[20] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[21] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[22] Markus Jakobsson,et al. Retroactive Detection of Malware with Applications to Mobile Platforms , 2010, HotSec.
[23] Gene Tsudik,et al. Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.
[24] Stefan Dziembowski,et al. One-Time Computable Self-erasing Functions , 2011, TCC.
[25] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[26] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.