Survey on secret sharing scheme with deduplication in cloud computing
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[2] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[3] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[4] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Toshiaki Tanaka,et al. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.
[6] Vinod M. Prabhakaran,et al. On the Communication Complexity of Secure Computation , 2013, IACR Cryptol. ePrint Arch..
[7] Y. Fujii,et al. A fast (2,n)-threshold scheme and its application , 2005 .
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[10] Toshiaki Tanaka,et al. A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[12] Doug Finner. Long-Term Storage of Electronic Data , 2004 .
[13] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.