Compact Proofs of Retrievability

From MaRDI portal
Publication:3600367

DOI10.1007/978-3-540-89255-7_7zbMath1206.68110OpenAlexW89553247MaRDI QIDQ3600367

Hovav Shacham, Brent Waters

Publication date: 10 February 2009

Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_7




Related Items (39)

Dynamic Provable Data Possession Protocols with Public Verifiability and Data PrivacySecure data storage in cloud: an e-stream cipher-based secure and dynamic updation policyMulti-instance publicly verifiable time-lock puzzle and its applicationsLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageA New Public Remote Integrity Checking Scheme with User PrivacyEfficient Dynamic Provable Data Possession with Public Verifiability and Data PrivacyPrivate Certificate-Based Remote Data Integrity Checking in Public CloudsDD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of RetrievabilityZero-knowledge proofs of retrievabilityPrivacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisitedA secure and effective anonymous integrity checking protocol for data storage in multicloudPrivacy-enhanced remote data integrity checking with updatable timestamp\texttt{FlipIt}: the game of ``stealthy takeoverEfficient Dynamic Provable Data Possession from Dynamic Binary TreeCloud data auditing with designated verifierEfficient proofs of retrievability using expander codesIdentity-based key-exposure resilient cloud storage public auditing scheme from latticesA position-aware Merkle tree for dynamic cloud data integrity verificationCryptanalysis of a public authentication protocol for outsourced databases with multi-user modificationPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsPractical homomorphic message authenticators for arithmetic circuitsDynamic proofs of retrievability via oblivious RAMMulti-prover proof of retrievabilityEfficient attribute-based encryption with attribute revocation for assured data deletionCompact Proofs of RetrievabilityMulti-theorem preprocessing NIZKs from latticesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelPractical Techniques Building on Encryption for Protecting and Managing Data in the CloudEfficient Privacy Preserving Data Audit in CloudPublic Cloud Data Auditing with Practical Key Update and Zero Knowledge PrivacyBlockchain-based efficient public integrity auditing for cloud storage against malicious auditorsImproved secure fuzzy auditing protocol for cloud data storagePublic audit for operation behavior logs with error locating in cloud storageAn alternative approach to public cloud data auditing supporting data dynamicsHash function design for cloud storage data auditingStill wrong use of pairings in cryptographyIncompressible encodingsSecurity of Auditing Protocols Against Subversion AttacksKey management for outsourced data security



Cites Work




This page was built for publication: Compact Proofs of Retrievability