Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
From MaRDI portal
Publication:2200702
DOI10.1016/J.INS.2018.09.013zbMATH Open1441.68031OpenAlexW2890178353WikidataQ129235228 ScholiaQ129235228MaRDI QIDQ2200702FDOQ2200702
Authors: Xiao Jun Zhang, Huaxiong Wang, Chunxiang Xu
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.09.013
Recommendations
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Intrusion-resilient public auditing protocol for data storage in cloud computing
- Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Lattice-based linearly homomorphic signatures in the standard model
- Leveled fully homomorphic signatures from standard lattices
- Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Compact Proofs of Retrievability
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Generating shorter bases for hard random lattices
- Verifiable Computation over Large Database with Incremental Updates
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Lattice-based linearly homomorphic signature scheme over binary field
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Cited In (5)
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- Functional broadcast encryption with applications to data sharing for cloud storage
- Cloud-assisted asynchronous key transport with post-quantum security
- WOTS-S: a quantum secure compact signature scheme for distributed ledger
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
This page was built for publication: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2200702)