Proofs of Replicated Storage Without Timing Assumptions
暂无分享,去创建一个
[1] Stefan Dziembowski,et al. Proofs of Space , 2015, CRYPTO.
[2] M. Anwar Hasan,et al. On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..
[3] Leonid Reyzin,et al. Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space , 2017, ASIACRYPT.
[4] Dana Dachman-Soled,et al. 10-Round Feistel is Indifferentiable from an Ideal Cipher , 2016, IACR Cryptol. ePrint Arch..
[5] Krzysztof Pietrzak. Proofs of Catalytic Space , 2018, IACR Cryptol. ePrint Arch..
[6] Ghassan O. Karame,et al. Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud , 2016, USENIX Security Symposium.
[7] Ian Miers,et al. PIEs: Public Incompressible Encodings for Decentralized Storage , 2019, IACR Cryptol. ePrint Arch..
[8] Srinivas Devadas,et al. Proof of Space from Stacked Expanders , 2016, TCC.
[9] Nenghai Yu,et al. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[10] John P. Steinberger,et al. Indifferentiability of 8-Round Feistel Networks , 2016, CRYPTO.
[11] Ronald L. Rivest,et al. Hourglass schemes: how to prove that cloud files are encrypted , 2012, CCS.
[12] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[13] Hovav Shacham,et al. Careful with Composition: Limitations of the Indifferentiability Framework , 2011, EUROCRYPT.
[14] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[16] Dan Boneh,et al. Verifiable Delay Functions , 2018, IACR Cryptol. ePrint Arch..
[17] Trond Hønsi. SpaceMint - A Cryptocurrency Based on Proofs of Space , 2017 .
[18] Alptekin Küpçü,et al. Transparent, Distributed, and Replicated Dynamic Provable Data Possession , 2013, ACNS.
[19] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[20] Jean-Sébastien Coron,et al. How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction , 2014, Journal of Cryptology.
[21] Ueli Maurer,et al. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology , 2004, TCC.
[22] Ben Fisch,et al. Tight Proofs of Space and Replication , 2019, IACR Cryptol. ePrint Arch..
[23] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..