Compact Proofs of Retrievability
From MaRDI portal
Publication:3600367
DOI10.1007/978-3-540-89255-7_7zbMATH Open1206.68110OpenAlexW89553247MaRDI QIDQ3600367FDOQ3600367
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_7
Recommendations
- Entropy and the Law of Small Numbers
- Nonuniform bounds in the Poisson approximation with applications to informational distances. II
- Improved lower bounds on the total variation distance for the Poisson approximation
- Non-uniform bounds in the Poisson approximation with applications to informational distances. I
- Poisson approximation in \(\chi^2\) distance by the Stein-Chen approach
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cites Work
Cited In (52)
- stoRNA: stateless transparent proofs of storage-time
- An alternative approach to public cloud data auditing supporting data dynamics
- Tight proofs of space and replication
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
- Efficient Privacy Preserving Data Audit in Cloud
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy
- Still wrong use of pairings in cryptography
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Efficient attribute-based encryption with attribute revocation for assured data deletion
- Security of Auditing Protocols Against Subversion Attacks
- Proofs of storage from homomorphic identification protocols
- Practical homomorphic message authenticators for arithmetic circuits
- Multi-prover proof of retrievability
- Towards a theory of data entanglement
- Key management for outsourced data security
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy
- Compact Proofs of Retrievability
- Proofs of Retrievability via Hardness Amplification
- Efficient Proofs of Secure Erasure
- Public audit for operation behavior logs with error locating in cloud storage
- Multi-instance publicly verifiable time-lock puzzle and its applications
- Efficient Dynamic Provable Data Possession from Dynamic Binary Tree
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- Privacy-enhanced remote data integrity checking with updatable timestamp
- Cloud data auditing with designated verifier
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- A secure and effective anonymous integrity checking protocol for data storage in multicloud
- Multi-theorem preprocessing NIZKs from lattices
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors
- Accountable Storage
- Auditable Compressed Storage
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- SecDedup: secure data deduplication with dynamic auditing in the cloud
- Zero-knowledge proofs of retrievability
- Simple proofs of space-time and rational proofs of storage
- FRIDA: data availability sampling from FRI
- Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy
- A New Public Remote Integrity Checking Scheme with User Privacy
- DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability
- Private Certificate-Based Remote Data Integrity Checking in Public Clouds
- Entropy and the Law of Small Numbers
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
- Efficient proofs of retrievability using expander codes
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
- A position-aware Merkle tree for dynamic cloud data integrity verification
- \texttt{FlipIt}: the game of ``stealthy takeover
- Dynamic proofs of retrievability via oblivious RAM
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
- Improved secure fuzzy auditing protocol for cloud data storage
- Incompressible encodings
- Hash function design for cloud storage data auditing
This page was built for publication: Compact Proofs of Retrievability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600367)