Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves

C Hanser, D Slamanig - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
When outsourcing large sets of data to the cloud, it is desirable for clients to efficiently check,
whether all outsourced data is still retrievable at any later point in time without requiring to …

Dynamic proofs of retrievability from Chameleon-Hashes

S Rass - 2013 International Conference on Security and …, 2013 - ieeexplore.ieee.org
Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the
consistent existence and availability of data residing at a potentially untrusted storage …

Multi-prover proof of retrievability

MB Paterson, DR Stinson, J Upadhyay - Journal of Mathematical …, 2018 - degruyter.com
There has been considerable recent interest in “cloud storage” wherein a user asks a server
to store a large file. One issue is whether the user can verify that the server is actually storing …

A framework for the design of secure and efficient proofs of retrievability

F Levy-dit-Vehel, M Roméas - … on Cryptography, Codes and Cyber Security, 2022 - Springer
Abstract Proofs of Retrievability (PoR) protocols ensure that a client can fully retrieve a large
outsourced file from an untrusted server. Good PoRs should have low communication …

Hy-sail: Hyper-scalability, availability and integrity layer for cloud storage systems

DM Amaral, JJC Gondim, RDO Albuquerque… - IEEE …, 2019 - ieeexplore.ieee.org
Cloud storage has gained increasing attention from the industry and research communities
with concerns about data stored in cloud computing environments, despite its many …

Codes with locality: constructions and applications to cryptographic protocols

J Lavauzelle - 2018 - pastel.hal.science
Locally correctable codes (LCCs) were introduced in order to retrieve pieces of information
from a noisy codeword, by using a limited number of queries to its symbols, this number …

Cloud storage file recoverability

CA Gorke, C Janson, F Armknecht, C Cid - Proceedings of the Fifth ACM …, 2017 - dl.acm.org
Data loss is perceived as one of the major threats for cloud storage. Consequently, the
security community developed several challenge-response protocols that allow a user to …

Modeling and construction of interactive cryptographic protocols for outsourced storage

M Roméas - 2022 - hal.science
This thesis deals with the security of the storage, the access and themaintenance of
outsourced data. Indeed, outsourced storage raises newthreats for users. We focus on the …

Efficient Proofs of Retrievability Using Expander Codes

F Levy-dit-Vehel, M Roméas - International Conference on Cryptology and …, 2022 - Springer
Abstract Proofs of Retrievability (PoR) protocols ensure that a client can fully retrieve a large
outsourced file from an untrusted server. Good PoRs should have low communication …

Generic constructions of PoRs from codes and instantiations

J Lavauzelle, F Levy-dit-Vehel - Journal of Mathematical Cryptology, 2019 - degruyter.com
In this paper, we show how to construct–from any linear code–a Proof of Retrievability
(𝖯𝗈𝖱) which features very low computation complexity on both the client (𝖵𝖾𝗋𝗂𝖿𝗂𝖾𝗋) and …