搜索结果: 1-15 共查到“军事学 storage”相关记录82条 . 查询时间(0.046 秒)
Security Reductions for White-Box Key-Storage in Mobile Payments
White-box cryptography secure key storage hardware-binding
font style='font-size:12px;'>
2019/9/16
The goal of white-box cryptography is to provide security even when the cryptographic implementation is executed in adversarially controlled environments. White-box implementations nowadays appear in ...
Secure Computation for Cloud data Storage
Multi-party computation semi-trusted cloud data security
font style='font-size:12px;'>
2019/6/19
One of the main goals of securing data transmission is focused on the security of cloud data storage. In this paper, we describe several cryptographic techniques which can be used to address the relev...
Simple Schemes in the Bounded Storage Model
Bounded Storage Model Commitment Oblivious Transfer
font style='font-size:12px;'>
2019/5/21
The bounded storage model promises unconditional security proofs against computationally unbounded adversaries, so long as the adversary’s space is bounded. In this work, we develop simple new constru...
What Storage Access Privacy is Achievable with Small Overhead?
oblivious RAM differential privacy lower bounds
font style='font-size:12px;'>
2019/4/16
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfo...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
font style='font-size:12px;'>
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
PIEs: Public Incompressible Encodings for Decentralized Storage
decentralized storage PIE
font style='font-size:12px;'>
2018/7/18
We present the first provably secure, practical approach to proving file replication (or other erasure coding) in distributed storage networks (DSNs). Storing multiple copies of a file FF is essential...
A Reusable Fuzzy Extractor with Practical Storage Size
threshold cryptography key management secret sharing
font style='font-size:12px;'>
2018/7/17
After the concept of a Fuzzy Extractor (FE) was rst introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input...
Proofs of Replicated Storage Without Timing Assumptions
proof of replication blockchain
font style='font-size:12px;'>
2018/7/9
In this paper we provide a formal treatment of proof of replicated storage, a novel cryptographic primitive recently proposed in the context of a novel cryptocurrency, namely Filecoin.
Weak Compression and (In)security of Rational Proofs of Storage
information theory proofs of storage rational security
font style='font-size:12px;'>
2018/5/28
We point out an implicit unproven assumption underlying the security of rational proofs of storage that is related to a concept we call weak randomized compression.
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Cloud storage ECC based public key cryptography hybrid cryptosystem
font style='font-size:12px;'>
2018/3/26
This paper presents a secure cloud storage scheme based on hybrid cryptosystem, which consists of Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and one-way hash function. Here...
Oblivious RAM with Small Storage Overhead
ORAM perfect correctness
font style='font-size:12px;'>
2018/3/14
In this work, we present a new approach to constructing Oblivious RAM (ORAM). Somewhat surprisingly, and despite the large amount of research interest that ORAM has received, all existing ORAM constru...
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Privacy-enhancing technologies private cloud services dynamic searchable symmetric encryption
font style='font-size:12px;'>
2017/12/25
Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics ...
Security notions for cloud storage and deduplication
storage systems generic cryptographic components
font style='font-size:12px;'>
2017/12/19
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise sec...
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Cloud storage shared data public auditing, identity privacy
font style='font-size:12px;'>
2017/9/28
As data sharing has become one of the most popular features offered by cloud storage services, designing public auditing mechanisms for integrity of shared data stored at the cloud becomes much more i...
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Secure Keyword Search Cloud Storage
font style='font-size:12px;'>
2017/8/21
Cloud computing is very popular for its computing and storage capacity at lower cost. More and more data are being moved to the cloud to reduce storage cost. On the other hand, since the cloud is not ...