A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
2016
International Journal of Network Security
Therefore, we survey the previous researches of data integrity based on public auditability which includes collecting the basic requirements and evaluation metrics, providing the representative with approaches ...
Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. ...
Setup 2. CSS receives challenge {(i, v i )} i∈I and generates a response proof of data storage correctness. ...
dblp:journals/ijnsec/HsienYH16
fatcat:mspcpq3xpraubh7rueeg2kl6zi
Study on Auditing Approaches for Preserving Data Integrity in Cloud Storage
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Management of data in a remote data centre may not be trustworthy. For this purpose many approaches were introduced for verifying the integrity of the user's data on the cloud storage. ...
This paper makes comparative analysis over different approaches and choose the best approach for checking the integrity of the data. ...
It has shortest response of any proof of retrievability scheme with private verifiability. ...
doi:10.23956/ijarcsse/v7i3/0146
fatcat:h62qz456u5gdbeywefx6n66tku
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications
[article]
2019
IACR Cryptology ePrint Archive
special cases of a more general notion of proofs of knowledge or possession. ...
and dynamically between parties based on the state of the setup. ...
to generalize the correctness notion. ...
dblp:journals/iacr/BadertscherJM19
fatcat:o4zqul3dpjfijelg7j5wz4on6i
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
2014
International Journal of Information Security
However, we observe that all existing protocols with public verifiability supporting data update, including Hao et al.' ...
The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. ...
Our construction is inspired by the sprit of zero knowledge proof and the details of the new protocol are as follows Fig.2 . -Setup. Let k, l be two security parameters. ...
doi:10.1007/s10207-014-0263-8
fatcat:2inexd7xgrf35avjsd4b47nezy
ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds
2015
International Journal of Security and Its Applications
We adapt the Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK) to realize the anonymous authentication of the owner's policy updating key without increasing any secret information to the ...
We take advantage of Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK) to implement a CP-ABE which enables the cloud to verify whether the access policy updating request for the specific ...
Taking advantage of the Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK), we extend the CP-ABE with dynamic policy updating to support the authentication of data owner. ...
doi:10.14257/ijsia.2015.9.8.08
fatcat:knon7ote3fbbvamaptpnpykxvu
Learning to Give Checkable Answers with Prover-Verifier Games
[article]
2021
arXiv
pre-print
The PVG consists of two learners with competing objectives: a trusted verifier network tries to choose the correct answer, and a more powerful but untrusted prover network attempts to persuade the verifier ...
of a particular answer, regardless of its correctness. ...
Resources used in preparing this research were provided, in part, by the Province of Ontario, the Government of Canada through CIFAR, and companies sponsoring the Vector Institute. ...
arXiv:2108.12099v1
fatcat:gi4ym3kodneqpcz2zcn5jqfxhe
Optical bench development for LISA
2017
International Conference on Space Optics — ICSO 2010
On the end point of each laser link, remote and local beam metrology with respect to inertial proof masses inside the spacecraft is realized by the LISA Optical Bench. ...
A comprehensive design of the Optical Bench has been developed, which includes all of the above mentioned functions and at the same time ensures manufacturability on the basis of hydroxide catalysis bonding ...
This approach, applied here to the best of our knowledge for the first time in an ultraprecise interferometric system, in particular minimizes pathlength measurement noise generated by pointing jitter ...
doi:10.1117/12.2309141
fatcat:lxbsym6urnbb3fskor5gim2o7q
Short Accountable Ring Signatures Based on DDH
[chapter]
2015
Lecture Notes in Computer Science
proofs of knowledge by Groth and Kohlweiss (EUROCRYPT 2015). ...
We give a highly efficient instantiation of our generic construction in the random oracle model by meticulously combining Camenisch's group signature scheme (CRYPTO 1997) with a generalization of the one-out-of-many ...
We also give a concrete instantiation, combining ideas from Camenisch's group signature [Cam97] with a generalization of the one-out-of-many proof of knowledge of Groth and Kohlweiss [GK15] . ...
doi:10.1007/978-3-319-24174-6_13
fatcat:flp2cxh6vndfxfyqbj5qa37u5m
Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking
2019
IEEE Access
In this paper, we propose a new RDIC scheme for big graphs, called GVD-RDIC, to support public auditing and verifiable dynamic graph updates with high efficiency. ...
The main obstacle for applying the existing RDIC schemes to big graphs is due to the lack of support for verifiable sub-graph operations with high efficiency. ...
To the best of our knowledge, this is the first work to fill in the research blank -there is still no secure and general RDIC scheme for big graphs that supports verifiable dynamic graph operations. ...
doi:10.1109/access.2019.2892442
fatcat:six46jwimnb53dxhparifnr5ne
Theorema 2.0: A Graphical User Interface for a Mathematical Assistant System
2013
Electronic Proceedings in Theoretical Computer Science
All these features are fully integrated into the Mathematica programming environment and allow the implementation of a modern user interface. ...
It heavily relies on powerful interactive capabilities introduced in recent releases of the underlying Mathematica system, most importantly the possibility of having dynamic objects connected to interface ...
What we already have now is the generic proof search procedure and the mechanism of inference rule lists and strategies with their interplay. ...
doi:10.4204/eptcs.118.5
fatcat:gur73si2kvca7d7guo2yqp7yty
Auditing Services in Cloud Computing For Achieving Data Access Control
2014
IOSR Journal of Computer Engineering
Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost. ...
The wide adoption of this promising computation model is prevented by security which is the primary obstacle especially for customers when their confidential data are consumed and produced during the computation ...
The security based on multi-proven zero-knowledge proof system, which satisfy completeness, knowledge soundness, and zero-knowledge properties has been proved. ...
doi:10.9790/0661-16175254
fatcat:aoeo6xukcjezlkrqpxgligvkqu
On the Unreasonable Effectiveness of Knowledge Distillation: Analysis in the Kernel Regime
[article]
2020
arXiv
pre-print
To prove our results, we extend the repertoire of techniques from linear systems dynamics. ...
Knowledge distillation (KD), i.e. one classifier being trained on the outputs of another classifier, is an empirically very successful technique for knowledge transfer between classifiers. ...
Figure 3 : 3 Dynamics of knowledge transfer with perfect and imperfect teacher w.r.t. the quality of the teacher. ...
arXiv:2003.13438v2
fatcat:tduvhvoeknbjvktwgxzoim7cqm
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
[article]
2018
IACR Cryptology ePrint Archive
We then revisit several (direct or indirect) applications of piO, and obtain a fully homomorphic encryption scheme (without circular security assumptions), a multi-key fully homomorphic encryption scheme ...
Particularly, our piO variant is able to obfuscate circuits with specific input domains regardless of the performed computation. ...
The Setup procedure generates parameters for the ELF and for the NIZK proof system. ...
dblp:journals/iacr/AgrikolaCH18
fatcat:rkoddbxhqba5dnkpidjdnrczcy
A Note on One Popular Non-Interactive Zero-Knowledge Proof System
2020
International Journal of Network Security
The characteristic is essentially incompatible with the general primitive of zero-knowledge proof, which does not require any extra trust. ...
Based on the system, they presented the first perfect NIZK argument system for any NP language and the first secure NIZK argument with universal composability for any NP language in the presence of a dynamic ...
Acknowledgements We thank the National Natural Science Foundation of China (#61411146001), and Open Foundation of State key Laboratory of Networking and Switching Technology (#SKLNST-2016-2-03, Beijing ...
dblp:journals/ijnsec/CaoWL20
fatcat:u37jfuozvncztapk2b2x2u6cxq
Foundations of Fully Dynamic Group Signatures
[chapter]
2016
Lecture Notes in Computer Science
In this work we take a close look at existing security definitions for fully dynamic group signatures. ...
For the primitive to be applicable in practice, it needs to support fully dynamic groups, i.e. users can join and leave at any time. ...
In the setup, group members generate their key pairs and interact with the group manager to join the group. ...
doi:10.1007/978-3-319-39555-5_7
fatcat:ksooufnb3vesnhhj4xyh6lchuu
« Previous
Showing results 1 — 15 out of 61,623 results