A formal treatment of end-to-end encrypted cloud storage
From MaRDI portal
Publication:6648201
DOI10.1007/978-3-031-68379-4_2MaRDI QIDQ6648201FDOQ6648201
Authors: Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson
Publication date: 4 December 2024
Recommendations
Cites Work
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Theory of Cryptography
- Multi-instance security and its application to password-based cryptography
- On the limitations of universally composable two-party computation without set-up assumptions
- Title not available (Why is that?)
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications
- Puncturable key wrapping and its applications
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
- A formal treatment of end-to-end encrypted cloud storage
Cited In (2)
This page was built for publication: A formal treatment of end-to-end encrypted cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6648201)