Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
30
views
9
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,767
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2009
Proofs of Storage from Homomorphic Identification Protocols
other
Author(s):
Giuseppe Ateniese
,
Seny Kamara
,
Jonathan Katz
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Resource Identification
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
Zero-knowledge proofs of identity
Amos Fiat
,
Adi Shamir
,
Uriel Feige
(1988)
0
comments
Cited
102
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Scalable and efficient provable data possession
Roberto Di Pietro
,
Giuseppe Ateniese
,
Luigi V. Mancini
…
(2008)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Compact Proofs of Retrievability
Hovav Shacham
,
Brent Waters
(2008)
0
comments
Cited
62
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 319-333
DOI:
10.1007/978-3-642-10366-7_19
SO-VID:
ad4cd9b0-a888-4b45-a270-03fc1d7d546c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Related-Key Cryptanalysis of the Full AES-192 and AES-256
pp. 542
Improved Cryptanalysis of Skein
pp. 37
Cascade Encryption Revisited
pp. 126
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
pp. 179
Group Encryption: Non-interactive Realization in the Standard Model
pp. 232
Hedged Public-Key Encryption: How to Protect against Bad Randomness
pp. 319
Proofs of Storage from Homomorphic Identification Protocols
pp. 334
Simple Adaptive Oblivious Transfer without Random Oracle
pp. 505
Security Notions and Generic Constructions for Client Puzzles
pp. 524
Foundations of Non-malleable Hash and One-Way Functions
pp. 617
Efficient Public Key Encryption Based on Ideal Lattices
pp. 636
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
pp. 685
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
pp. 703
Signature Schemes with Bounded Leakage Resilience
Similar content
3,767
Über Homomorphe endlicher auflösbarer Gruppen
Authors:
Klaus Doerk
Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion
Authors:
Lizhi Xiong
,
Danping Dong
Morphisms from non-periodic $\mathbb{Z}^2$ subshifts II: constructing homomorphisms to square-filling mixing shifts of finite type
Authors:
SAMUEL LIGHTWOOD
See all similar
Cited by
20
Dynamic Provable Data Possession
Authors:
Charalampos Papamanthou
,
C. Chris Erway
,
Alptekin Küpçü
…
Compact Proofs of Retrievability
Authors:
Hovav Shacham
,
Brent Waters
Data storage auditing service in cloud computing: challenges, methods and opportunities
Authors:
Kan Yang
,
Xiaohua Jia
See all cited by