The following pages link to Compact Proofs of Retrievability (Q3600367):
Displaying 40 items.
- Zero-knowledge proofs of retrievability (Q350924) (← links)
- \texttt{FlipIt}: the game of ``stealthy takeover'' (Q380966) (← links)
- Dynamic proofs of retrievability via oblivious RAM (Q514467) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Cloud data auditing with designated verifier (Q893869) (← links)
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (Q1640423) (← links)
- A secure and effective anonymous integrity checking protocol for data storage in multicloud (Q1666147) (← links)
- A position-aware Merkle tree for dynamic cloud data integrity verification (Q1701711) (← links)
- Practical homomorphic message authenticators for arithmetic circuits (Q1747657) (← links)
- Multi-prover proof of retrievability (Q1755952) (← links)
- Efficient attribute-based encryption with attribute revocation for assured data deletion (Q2004758) (← links)
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors (Q2057147) (← links)
- Incompressible encodings (Q2096497) (← links)
- Multi-instance publicly verifiable time-lock puzzle and its applications (Q2147261) (← links)
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (Q2200702) (← links)
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification (Q2215138) (← links)
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions (Q2223693) (← links)
- Improved secure fuzzy auditing protocol for cloud data storage (Q2317638) (← links)
- Public audit for operation behavior logs with error locating in cloud storage (Q2318174) (← links)
- An alternative approach to public cloud data auditing supporting data dynamics (Q2318271) (← links)
- Hash function design for cloud storage data auditing (Q2333825) (← links)
- Still wrong use of pairings in cryptography (Q2335138) (← links)
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited (Q2656693) (← links)
- Privacy-enhanced remote data integrity checking with updatable timestamp (Q2663494) (← links)
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud (Q2803632) (← links)
- Efficient Privacy Preserving Data Audit in Cloud (Q2808076) (← links)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (Q2817477) (← links)
- Efficient Dynamic Provable Data Possession from Dynamic Binary Tree (Q2953852) (← links)
- A New Public Remote Integrity Checking Scheme with User Privacy (Q3194614) (← links)
- Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy (Q3194615) (← links)
- Private Certificate-Based Remote Data Integrity Checking in Public Clouds (Q3196416) (← links)
- DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability (Q3196428) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- Compact Proofs of Retrievability (Q3600367) (← links)
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy (Q5056036) (← links)
- Key management for outsourced data security (Q5260595) (← links)
- Security of Auditing Protocols Against Subversion Attacks (Q5859735) (← links)
- Multi-theorem preprocessing NIZKs from lattices (Q5918862) (← links)
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management (Q6492059) (← links)
- SecDedup: secure data deduplication with dynamic auditing in the cloud (Q6492070) (← links)