Data security and privacy protection for cloud storage: A survey
P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
A survey of secure data deduplication schemes for cloud storage systems
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce
storage costs. Even though the general deduplication approach has been increasingly …
storage costs. Even though the general deduplication approach has been increasingly …
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that
keeps their cost down is deduplication, which stores only a single copy of repeating data …
keeps their cost down is deduplication, which stores only a single copy of repeating data …
The moral character of cryptographic work
P Rogaway - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Cryptography rearranges power: it configures who can do what, from what. This makes
cryptography an inherently\textit {political} tool, and it confers on the field an intrinsically\textit …
cryptography an inherently\textit {political} tool, and it confers on the field an intrinsically\textit …
Leakage-resilient cryptography
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
Public-key cryptosystems resilient to key leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …
adversarial models that do not capture side-channel attacks. Such attacks exploit various …
Leakage-resilient public-key cryptography in the bounded-retrieval model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …
attacker can repeatedly and adaptively learn information about the secret key, subject only …
Cryptography against continuous memory attacks
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …
A leakage-resilient mode of operation
K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …
than–a pseudorandom function: for wPRFs one only requires that the output is …
Public-key encryption in the bounded-retrieval model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …
providing security against various forms of adversarial “key leakage” attacks. In this model …