A New Delegation Provable Data Possession in Public Cloud Storage
暂无分享,去创建一个
Bin Li | Jian Yi Liu | Chen Lei Cao | Jin Xia Wei | Jinxia Wei | J. Liu | Bin Li | Chenlei Cao
[1] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[2] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[3] Gail-Joon Ahn,et al. Collaborative integrity verification in hybrid clouds , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[6] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[7] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[8] Roberto Tamassia,et al. Authenticated Data Structures , 2003, ESA.
[9] Yongjun Ren,et al. Designated-Verifier Provable Data Possession in Public Cloud Storage , 2013 .
[10] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[11] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[12] M. Younus Javed,et al. Applying Provable Data Possession with Elgamal in Cloud Computing , 2012 .