搜索结果: 1-13 共查到“军事学 provable data possession”相关记录13条 . 查询时间(0.14 秒)
A Generic Dynamic Provable Data Possession Framework
Secure Data Outsourcing Dynamic Provable Data Possession (DPDP), Authenticated Data Structures
2016/12/12
Ateniese et al. introduced the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data, and called it the Dynamic Provable Data Poss...
A Multi-Function Provable Data Possession Scheme in Cloud Computing
multi-function provable data possession cloud computing
2016/1/8
In order to satisfy the different requirements of provable data possession in cloud
computing, a multi-function provable data possession (MF-PDP) is proposed, which supports
public verification, dat...
Efficient Dynamic Provable Data Possession Protocols with Public
Provable Data Possession Dynamcity Public Verifiability
2015/12/29
An efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data
Privacy was recently published in ACISP’15. It appears that three attacks menace this
scheme. The first one en...
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
authenticated dictionary provable data possession
2014/3/7
With popularity of cloud storage, efficiently proving the integrity of data stored at an untrusted server has become significant. Authenticated Skip Lists and Rank-based Authenticated Skip Lists (RBAS...
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Provable data possession proofs of retrievability
2014/3/12
When outsourcing large sets of data to the cloud, it is desirable for clients to efficiently check, whether all outsourced data is still retrievable at any later point in time without requiring to dow...
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Secure cloud storage provable data possession
2014/3/13
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptog...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage, Provable Data Possession, Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/21
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
public-key cryptography / Public key cryptosystem Error-correcting code Code based PKC Cyclic code Multivariate PKC Gr鯾 ner bases Rank attack PQC.
2012/3/23
In this paper, we present a new class of multivariate public-key cryptosystems, K(XIII)SE(2)PKC realizing the coding rate of exactly 1.0, based on random pseudo cyclic codes. The K(XIII)SE(2)PKC is co...
As online storage-outsourcing services (e.g., Amazon’s S3) and resource-sharing networks
(e.g., peer-to-peer and grid networks) became popular, the problem of efficiently proving the
integrity of da...
Scalable and Efficient Provable Data Possession
block modification Provable Data Possession PDP
2009/6/3
Storage outsourcing is a rising trend which prompts a
number of interesting security issues, many of which
have been extensively investigated in the past. However,
Provable Data Possession (PDP) is...
We introduce a model for provable data possession (PDP) that allows a client that has stored
data at an untrusted server to verify that the server possesses the original data without retrieving it. T...