共 13 条
- [1] Deswarte Y., Quisquater J., Saidane A., Remote integrity checking, Integrity and Internal Control in Information Systems VI, pp. 1-11, (2004)
- [2] Oprea A., Reiter M.K., Yang K., Space-efficient block storage integrity, Internet Society, Network and Distributed System Security Symposium, pp. 1-12, (2005)
- [3] Ateniese G., Burns R., Curtmola R., Et al., Provable data possession at untrusted stores, ACM Conference on Computer and Communications Security, pp. 598-609, (2007)
- [4] Ateniese G., Burns R., Curtmola R., Et al., Remote data checking using Provable data possession, ACM Transactions on Information & System Security(TISSEC), 14, 1, pp. 1-34, (2011)
- [5] Juels A., Pors: proofs of retrievability for large files, ACM Conference on Computer and Communications Security, pp. 584-597, (2007)
- [6] Shacham H., Waters B., Compact proofs of retrievability, Asiacrypt LNCS 5350, pp. 90-107, (2008)
- [7] Shacham H., Waters B., Compact proofs of retrievability, Journal of Cryptology, 26, 3, pp. 442-483, (2013)
- [8] Shamir A., Identity-based cryptosystems and signature schemes, pp. 47-53, (1984)
- [9] Boneh D., Franklin M.K., Identity based encryption from the weil pairing, Siam Journal on Computing, 32, 3, pp. 213-229, (2001)
- [10] Zhang J., Dong Q., Efficient ID-based public auditing for the outsourced data in cloud storage, Information Sciences, 343-344, C, pp. 1-14, (2016)