Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
From MaRDI portal
Publication:2200702
DOI10.1016/j.ins.2018.09.013zbMath1441.68031OpenAlexW2890178353WikidataQ129235228 ScholiaQ129235228MaRDI QIDQ2200702
Xiao Jun Zhang, Huaxiong Wang, Chunxiang Xu
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.09.013
Related Items (4)
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ WOTS-S: a quantum secure compact signature scheme for distributed ledger ⋮ Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage ⋮ Functional broadcast encryption with applications to data sharing for cloud storage
Cites Work
- Lattice-based linearly homomorphic signatures in the standard model
- Generating shorter bases for hard random lattices
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Verifiable Computation over Large Database with Incremental Updates
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai Trees, or How to Delegate a Lattice Basis
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Compact Proofs of Retrievability
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Lattice-based linearly homomorphic signature scheme over binary field
- Privacy-Preserving Public Auditing for Secure Cloud Storage
This page was built for publication: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices