[1] |
王宏远, 祝烈煌, 李龙一佳 . 云存储中支持数据去重的群组数据持有性证明[J]. 软件学报, 2016,27(6): 1417-1431.
|
|
WANG H Y , ZHU L H , LI L Y J . Group provable data possession with deduplication in cloud storage[J]. Journal of Software, 2016,27(6): 1417-1431.
|
[2] |
查雅行, 罗守山, 卞建超 ,等. 基于多分支认证树的多用户多副本数据持有性证明方案[J]. 通信学报, 2015,36(11): 80-91.
|
|
ZHA Y X , LUO S S , BIAN J C ,et al. Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree[J]. Journal on Communications, 2015,36(11): 80-91.
|
[3] |
何凯, 黄传河, 王小毛 ,等. 云存储中数据完整性的聚合盲审计方法[J]. 通信学报, 2015,36(10): 119-132.
|
|
HE K , HUANG C H , WANG X M ,et al. Aggregated privacy-preserving auditing for cloud data integrity[J]. Journal on Communications, 2015,36(10): 119-132.
|
[4] |
谭霜, 贾焰, 韩伟红 . 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1): 164-177.
|
|
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015,38(1): 164-177.
|
[5] |
YUAN J , YU S . Efficient public integrity checking for cloud data sharing with multi-user modification[C]// IEEE International Conference on Computer Communications. 2014: 2121-2129.
|
[6] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Remote data checking using provable data possession[J]. ACM Transactions on Information & System Security, 2011,14(1):12.
|
[7] |
JUELS A , KALISKI B S , BOWERS K D ,et al. Proof of retrievability for archived files,US 8381062 B1[P]. 2013.
|
[8] |
ARMKNECHT F , BOHLI J M , KARAME G O ,et al. Outsourced proofs of retrievability[C]// SIGSAC Conference on Computer and Communications Security. 2014: 831-843.
|
[9] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// ACM Conference on Computer and Communications Security. 2007: 598-609.
|
[10] |
DAN B , LYNN B , SHACHAM H . Short signatures from the weil pairing[J]. Journal of Cryptology, 2004,17(4): 297-319.
|
[11] |
WANG Q , WANG C , LI J ,et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// European Conference on Research in Computer Security. 2009: 355-370.
|
[12] |
WANG C , CHOW S S M , WANG Q ,et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013,62(2): 362-375.
|
[13] |
CURTMOLA R , KHAN O , BURNS R . Robust remote data checking[C]// ACM Workshop on Storage Security and Survivability. 2008: 63-68.
|
[14] |
WANG H , ZHU L , XU C ,et al. A universal method for realizing non-repudiable provable data possession in cloud storage[J]. Security& Communication Networks, 2016,9(14): 2291-2301.
|
[15] |
HANSER C , SLAMANIG D . Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves[C]// International Conference on Security and Cryptography. 2015: 15-26.
|
[16] |
赵曼, 徐和根, 马峰 . 基于椭圆曲线密码(ECC)算法的图像加密技术的硬件设计[C]// 中国通信学会学术年会. 2012: 18-21.
|
|
ZHAO M , XU H G , MA F . Hardware design based on elliptic curve cryptography (ECC) algorithm for image encryption technology[C]// Annual Meeting of China Institute of Communications. 2012: 18-21.
|
[17] |
PEDERSEN T P , . Non-interactive and information-theoretic secure verifiable secret sharing[C]// International Cryptology Conference on Advances in Cryptology. 1991: 129-140.
|
[18] |
PEDERSEN T P , . Non-interactive and information theoretic secure verifiable secret sharing[C]// International Cryptology Conference on Advances in Cryptology. 1991.
|
[19] |
DENT A W . The hardness of the DHK problem in the generic group model[J]. IACR Cryptology ePrint Archive, 2006:156.
|
[20] |
MO Z , ZHOU Y , CHEN S ,et al. Enabling non-repudiable data possession verification in cloud storage systems[C]// IEEE International Conference on Cloud Computing. 2014: 232-239.
|
[21] |
MCCURLEY K S , . The discrete logarithm problem[C]// Symposium in Applied Math. 1990: 49-74.
|