Compact Proofs of Retrievability
From MaRDI portal
Publication:3600367
DOI10.1007/978-3-540-89255-7_7zbMATH Open1206.68110OpenAlexW89553247MaRDI QIDQ3600367FDOQ3600367
Authors: Hovav Shacham, Brent Waters
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_7
Recommendations
- Entropy and the Law of Small Numbers
- Nonuniform bounds in the Poisson approximation with applications to informational distances. II
- Improved lower bounds on the total variation distance for the Poisson approximation
- Non-uniform bounds in the Poisson approximation with applications to informational distances. I
- Poisson approximation in \(\chi^2\) distance by the Stein-Chen approach
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cites Work
Cited In (65)
- An alternative approach to public cloud data auditing supporting data dynamics
- Tight proofs of space and replication
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
- Still wrong use of pairings in cryptography
- Symmetric-key based proofs of retrievability supporting public verification
- Efficient attribute-based encryption with attribute revocation for assured data deletion
- Proofs of storage from homomorphic identification protocols
- Practical homomorphic message authenticators for arithmetic circuits
- Efficient dynamic provable data possession from dynamic binary tree
- Compact proofs of retrievability
- Multi-prover proof of retrievability
- Towards a theory of data entanglement
- Is extracting data the same as possessing data?
- Key management for outsourced data security
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy
- Compact Proofs of Retrievability
- Proofs of Retrievability via Hardness Amplification
- Efficient Proofs of Secure Erasure
- Security of auditing protocols against subversion attacks
- Public audit for operation behavior logs with error locating in cloud storage
- Multi-instance publicly verifiable time-lock puzzle and its applications
- Lightweight delegatable proofs of storage
- Efficient dynamic provable data possession with public verifiability and data privacy
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- A new public remote integrity checking scheme with user privacy
- Private certificate-based remote data integrity checking in public clouds
- DD-POR: dynamic operations and direct repair in network coding-based proof of retrievability
- Privacy-enhanced remote data integrity checking with updatable timestamp
- Cloud data auditing with designated verifier
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- A secure and effective anonymous integrity checking protocol for data storage in multicloud
- Practical techniques building on encryption for protecting and managing data in the cloud
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors
- Proofs of storage: theory, constructions and applications
- Zero-knowledge proofs of retrievability
- Simple proofs of space-time and rational proofs of storage
- Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons
- Non-uniform bounds in the Poisson approximation with applications to informational distances. I
- Leakage-resilient identification schemes from zero-knowledge proofs of storage
- Efficient privacy preserving data audit in cloud
- Entropy and the Law of Small Numbers
- Nonuniform bounds in the Poisson approximation with applications to informational distances. II
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
- Efficient proofs of retrievability using expander codes
- Generic constructions of PoRs from codes and instantiations
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Public cloud data auditing with practical key update and zero knowledge privacy
- \texttt{FlipIt}: the game of ``stealthy takeover
- Dynamic proofs of retrievability via oblivious RAM
- Dynamic proofs of retrievability via oblivious RAM
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
- Improved secure fuzzy auditing protocol for cloud data storage
- Incompressible encodings
- New techniques in replica encodings with client setup
- Hash function design for cloud storage data auditing
- stoRNA: stateless transparent proofs of storage-time
- Proofs of retrievability via fountain code
- Multi-theorem preprocessing NIZKs from lattices
- Auditable Compressed Storage
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- SecDedup: secure data deduplication with dynamic auditing in the cloud
- FRIDA: data availability sampling from FRI
- Accountable storage
- Homomorphic linear authentication schemes from \(\varepsilon\)-ASU\(_2\) functions for proofs of retrievability
This page was built for publication: Compact Proofs of Retrievability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600367)