Secure distributed storage and retrieval
From MaRDI portal
Publication:1575652
DOI10.1016/S0304-3975(98)00263-1zbMATH Open0944.68055MaRDI QIDQ1575652FDOQ1575652
Authors: Juan Garay, Rosario Gennaro, C. S. Jutla, Tal Rabin
Publication date: 21 August 2000
Published in: Theoretical Computer Science (Search for Journal in Brave)
Recommendations
Cites Work
- Probabilistic encryption
- A method for obtaining digital signatures and public-key cryptosystems
- How to share a secret
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- How to share a function securely
- Efficient dispersal of information for security, load balancing, and fault tolerance
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Robust threshold DSS signatures
- Robust and efficient sharing of RSA functions
- Title not available (Why is that?)
- How to withstand mobile virus attacks (extended abstract)
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- Secure distributed storage and retrieval
- Title not available (Why is that?)
- Distributed fingerprints and secure information dispersal
Cited In (17)
- Towards a theory of data entanglement
- Computational Science - ICCS 2004
- Online data storage using implicit security
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- Byzantine disk paxos: optimal resilience with Byzantine shared memory
- Secure distributed storage and retrieval
- Scalable secure storage when half the system is faulty
- On information-theoretic secure multiparty computation with local repairability
- A method of protected distribution of data among unreliable and untrusted nodes
- Composable and robust outsourced storage
- Encrypt-to-Self: Securely Outsourcing Storage
- On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications
- Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty
- An Efficient Dispersal and Encryption Scheme for Secure Distributed Information Storage
- Title not available (Why is that?)
- Building secure file systems out of Byzantine storage
- STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement
This page was built for publication: Secure distributed storage and retrieval
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1575652)