Filters








61,623 Hits in 8.2 sec

A Survey of Public Auditing for Secure Data Storage in Cloud Computing

Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang
2016 International Journal of Network Security  
Therefore, we survey the previous researches of data integrity based on public auditability which includes collecting the basic requirements and evaluation metrics, providing the representative with approaches  ...  Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users.  ...  Setup 2. CSS receives challenge {(i, v i )} i∈I and generates a response proof of data storage correctness.  ... 
dblp:journals/ijnsec/HsienYH16 fatcat:mspcpq3xpraubh7rueeg2kl6zi

Study on Auditing Approaches for Preserving Data Integrity in Cloud Storage

Anne Srijanya .K
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Management of data in a remote data centre may not be trustworthy. For this purpose many approaches were introduced for verifying the integrity of the user's data on the cloud storage.  ...  This paper makes comparative analysis over different approaches and choose the best approach for checking the integrity of the data.  ...  It has shortest response of any proof of retrievability scheme with private verifiability.  ... 
doi:10.23956/ijarcsse/v7i3/0146 fatcat:h62qz456u5gdbeywefx6n66tku

Agree-and-Prove: Generalized Proofs Of Knowledge and Applications [article]

Christian Badertscher, Daniel Jost, Ueli Maurer
2019 IACR Cryptology ePrint Archive  
special cases of a more general notion of proofs of knowledge or possession.  ...  and dynamically between parties based on the state of the setup.  ...  to generalize the correctness notion.  ... 
dblp:journals/iacr/BadertscherJM19 fatcat:o4zqul3dpjfijelg7j5wz4on6i

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong
2014 International Journal of Information Security  
However, we observe that all existing protocols with public verifiability supporting data update, including Hao et al.'  ...  The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information.  ...  Our construction is inspired by the sprit of zero knowledge proof and the details of the new protocol are as follows Fig.2 . -Setup. Let k, l be two security parameters.  ... 
doi:10.1007/s10207-014-0263-8 fatcat:2inexd7xgrf35avjsd4b47nezy

ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds

Liang-Ao Zhang, Xingming Sun, Zhihua Xia, Qiuju Ji
2015 International Journal of Security and Its Applications  
We adapt the Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK) to realize the anonymous authentication of the owner's policy updating key without increasing any secret information to the  ...  We take advantage of Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK) to implement a CP-ABE which enables the cloud to verify whether the access policy updating request for the specific  ...  Taking advantage of the Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK), we extend the CP-ABE with dynamic policy updating to support the authentication of data owner.  ... 
doi:10.14257/ijsia.2015.9.8.08 fatcat:knon7ote3fbbvamaptpnpykxvu

Learning to Give Checkable Answers with Prover-Verifier Games [article]

Cem Anil, Guodong Zhang, Yuhuai Wu, Roger Grosse
2021 arXiv   pre-print
The PVG consists of two learners with competing objectives: a trusted verifier network tries to choose the correct answer, and a more powerful but untrusted prover network attempts to persuade the verifier  ...  of a particular answer, regardless of its correctness.  ...  Resources used in preparing this research were provided, in part, by the Province of Ontario, the Government of Canada through CIFAR, and companies sponsoring the Vector Institute.  ... 
arXiv:2108.12099v1 fatcat:gi4ym3kodneqpcz2zcn5jqfxhe

Optical bench development for LISA

J. Bogenstahl, C. Diekmann, E. D. Fitzsimons, R. Fleddermann, E. Granova, C. J. Killow, J. Pijnenburg, D. I. Robertson, A. Shoda, A. Sohmer, M. Tröbs, H. Ward (+9 others)
2017 International Conference on Space Optics — ICSO 2010  
On the end point of each laser link, remote and local beam metrology with respect to inertial proof masses inside the spacecraft is realized by the LISA Optical Bench.  ...  A comprehensive design of the Optical Bench has been developed, which includes all of the above mentioned functions and at the same time ensures manufacturability on the basis of hydroxide catalysis bonding  ...  This approach, applied here to the best of our knowledge for the first time in an ultraprecise interferometric system, in particular minimizes pathlength measurement noise generated by pointing jitter  ... 
doi:10.1117/12.2309141 fatcat:lxbsym6urnbb3fskor5gim2o7q

Short Accountable Ring Signatures Based on DDH [chapter]

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
2015 Lecture Notes in Computer Science  
proofs of knowledge by Groth and Kohlweiss (EUROCRYPT 2015).  ...  We give a highly efficient instantiation of our generic construction in the random oracle model by meticulously combining Camenisch's group signature scheme (CRYPTO 1997) with a generalization of the one-out-of-many  ...  We also give a concrete instantiation, combining ideas from Camenisch's group signature [Cam97] with a generalization of the one-out-of-many proof of knowledge of Groth and Kohlweiss [GK15] .  ... 
doi:10.1007/978-3-319-24174-6_13 fatcat:flp2cxh6vndfxfyqbj5qa37u5m

Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking

Yu Lu, Fei Hu
2019 IEEE Access  
In this paper, we propose a new RDIC scheme for big graphs, called GVD-RDIC, to support public auditing and verifiable dynamic graph updates with high efficiency.  ...  The main obstacle for applying the existing RDIC schemes to big graphs is due to the lack of support for verifiable sub-graph operations with high efficiency.  ...  To the best of our knowledge, this is the first work to fill in the research blank -there is still no secure and general RDIC scheme for big graphs that supports verifiable dynamic graph operations.  ... 
doi:10.1109/access.2019.2892442 fatcat:six46jwimnb53dxhparifnr5ne

Theorema 2.0: A Graphical User Interface for a Mathematical Assistant System

Wolfgang Windsteiger
2013 Electronic Proceedings in Theoretical Computer Science  
All these features are fully integrated into the Mathematica programming environment and allow the implementation of a modern user interface.  ...  It heavily relies on powerful interactive capabilities introduced in recent releases of the underlying Mathematica system, most importantly the possibility of having dynamic objects connected to interface  ...  What we already have now is the generic proof search procedure and the mechanism of inference rule lists and strategies with their interplay.  ... 
doi:10.4204/eptcs.118.5 fatcat:gur73si2kvca7d7guo2yqp7yty

Auditing Services in Cloud Computing For Achieving Data Access Control

N. Mahesh kumar
2014 IOSR Journal of Computer Engineering  
Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost.  ...  The wide adoption of this promising computation model is prevented by security which is the primary obstacle especially for customers when their confidential data are consumed and produced during the computation  ...  The security based on multi-proven zero-knowledge proof system, which satisfy completeness, knowledge soundness, and zero-knowledge properties has been proved.  ... 
doi:10.9790/0661-16175254 fatcat:aoeo6xukcjezlkrqpxgligvkqu

On the Unreasonable Effectiveness of Knowledge Distillation: Analysis in the Kernel Regime [article]

Arman Rahbar, Ashkan Panahi, Chiranjib Bhattacharyya, Devdatt Dubhashi, Morteza Haghir Chehreghani
2020 arXiv   pre-print
To prove our results, we extend the repertoire of techniques from linear systems dynamics.  ...  Knowledge distillation (KD), i.e. one classifier being trained on the outputs of another classifier, is an empirically very successful technique for knowledge transfer between classifiers.  ...  Figure 3 : 3 Dynamics of knowledge transfer with perfect and imperfect teacher w.r.t. the quality of the teacher.  ... 
arXiv:2003.13438v2 fatcat:tduvhvoeknbjvktwgxzoim7cqm

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO [article]

Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
2018 IACR Cryptology ePrint Archive  
We then revisit several (direct or indirect) applications of piO, and obtain a fully homomorphic encryption scheme (without circular security assumptions), a multi-key fully homomorphic encryption scheme  ...  Particularly, our piO variant is able to obfuscate circuits with specific input domains regardless of the performed computation.  ...  The Setup procedure generates parameters for the ELF and for the NIZK proof system.  ... 
dblp:journals/iacr/AgrikolaCH18 fatcat:rkoddbxhqba5dnkpidjdnrczcy

A Note on One Popular Non-Interactive Zero-Knowledge Proof System

Zhengjun Cao, Xiqi Wang, Lihua Liu
2020 International Journal of Network Security  
The characteristic is essentially incompatible with the general primitive of zero-knowledge proof, which does not require any extra trust.  ...  Based on the system, they presented the first perfect NIZK argument system for any NP language and the first secure NIZK argument with universal composability for any NP language in the presence of a dynamic  ...  Acknowledgements We thank the National Natural Science Foundation of China (#61411146001), and Open Foundation of State key Laboratory of Networking and Switching Technology (#SKLNST-2016-2-03, Beijing  ... 
dblp:journals/ijnsec/CaoWL20 fatcat:u37jfuozvncztapk2b2x2u6cxq

Foundations of Fully Dynamic Group Signatures [chapter]

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2016 Lecture Notes in Computer Science  
In this work we take a close look at existing security definitions for fully dynamic group signatures.  ...  For the primitive to be applicable in practice, it needs to support fully dynamic groups, i.e. users can join and leave at any time.  ...  In the setup, group members generate their key pairs and interact with the group manager to join the group.  ... 
doi:10.1007/978-3-319-39555-5_7 fatcat:ksooufnb3vesnhhj4xyh6lchuu
« Previous Showing results 1 — 15 out of 61,623 results