Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
From MaRDI portal
(Redirected from Publication:2200702)
Recommendations
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Intrusion-resilient public auditing protocol for data storage in cloud computing
- Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
Cites work
- Bonsai trees, or how to delegate a lattice basis
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Compact Proofs of Retrievability
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Generating shorter bases for hard random lattices
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Lattice-based linearly homomorphic signature scheme over binary field
- Lattice-based linearly homomorphic signatures in the standard model
- Leveled fully homomorphic signatures from standard lattices
- Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Trapdoors for hard lattices and new cryptographic constructions
- Verifiable Computation over Large Database with Incremental Updates
Cited in
(5)- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- Functional broadcast encryption with applications to data sharing for cloud storage
- Cloud-assisted asynchronous key transport with post-quantum security
- WOTS-S: a quantum secure compact signature scheme for distributed ledger
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
This page was built for publication: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2200702)