Compact Proofs of Retrievability
From MaRDI portal
Publication:3600367
Recommendations
- Entropy and the Law of Small Numbers
- Nonuniform bounds in the Poisson approximation with applications to informational distances. II
- Improved lower bounds on the total variation distance for the Poisson approximation
- Non-uniform bounds in the Poisson approximation with applications to informational distances. I
- Poisson approximation in \(\chi^2\) distance by the Stein-Chen approach
Cites work
Cited in
(65)- Efficient dynamic provable data possession with public verifiability and data privacy
- Compact Proofs of Retrievability
- Incompressible encodings
- Nonuniform bounds in the Poisson approximation with applications to informational distances. II
- Efficient dynamic provable data possession from dynamic binary tree
- Efficient Proofs of Secure Erasure
- Proofs of Retrievability via Hardness Amplification
- Lightweight delegatable proofs of storage
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
- Efficient attribute-based encryption with attribute revocation for assured data deletion
- Practical techniques building on encryption for protecting and managing data in the cloud
- Privacy-enhanced remote data integrity checking with updatable timestamp
- New techniques in replica encodings with client setup
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- Efficient proofs of retrievability using expander codes
- Towards a theory of data entanglement
- A new public remote integrity checking scheme with user privacy
- Private certificate-based remote data integrity checking in public clouds
- DD-POR: dynamic operations and direct repair in network coding-based proof of retrievability
- An alternative approach to public cloud data auditing supporting data dynamics
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors
- Simple proofs of space-time and rational proofs of storage
- Is extracting data the same as possessing data?
- Proofs of storage from homomorphic identification protocols
- Proofs of storage: theory, constructions and applications
- Leakage-resilient identification schemes from zero-knowledge proofs of storage
- Zero-knowledge proofs of retrievability
- Hash function design for cloud storage data auditing
- \texttt{FlipIt}: the game of ``stealthy takeover
- Public cloud data auditing with practical key update and zero knowledge privacy
- Security of auditing protocols against subversion attacks
- Cloud data auditing with designated verifier
- Compact proofs of retrievability
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons
- Improved secure fuzzy auditing protocol for cloud data storage
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- Dynamic proofs of retrievability via oblivious RAM
- Tight proofs of space and replication
- Practical homomorphic message authenticators for arithmetic circuits
- Generic constructions of PoRs from codes and instantiations
- Dynamic proofs of retrievability via oblivious RAM
- Key management for outsourced data security
- Non-uniform bounds in the Poisson approximation with applications to informational distances. I
- Public audit for operation behavior logs with error locating in cloud storage
- Efficient privacy preserving data audit in cloud
- Symmetric-key based proofs of retrievability supporting public verification
- Still wrong use of pairings in cryptography
- A secure and effective anonymous integrity checking protocol for data storage in multicloud
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy
- Multi-instance publicly verifiable time-lock puzzle and its applications
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Multi-prover proof of retrievability
- Entropy and the Law of Small Numbers
- FRIDA: data availability sampling from FRI
- stoRNA: stateless transparent proofs of storage-time
- Accountable storage
- Auditable Compressed Storage
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- SecDedup: secure data deduplication with dynamic auditing in the cloud
- Homomorphic linear authentication schemes from \(\varepsilon\)-ASU\(_2\) functions for proofs of retrievability
- Proofs of retrievability via fountain code
- Multi-theorem preprocessing NIZKs from lattices
This page was built for publication: Compact Proofs of Retrievability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600367)