Verifiable Message-Locked Encryption

Conference object English OPEN
Canard, Sébastien; Laguillaumie, Fabien; Paindavoine;

One of today’s main challenge related to cloud storage is to maintain the functionalities and the efficiency of customers’ and service providers’ usual environments while protecting the confidentiality of sensitive data. Deduplication is one of those functionalities: ... View more
  • References (19)
    19 references, page 1 of 2

    1. M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev. Message-locked encryption for lock-dependent messages. In Advances in Cryptology - CRYPTO 2013. LNCS, vol. 8042 pp. 374{391, 2013.

    2. M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and e ciently searchable encryption. In Advances in Cryptology - CRYPTO 2007. LNCS, vol.4622, pp. 535{552, 2007.

    3. M. Bellare and S. Keelveedhi. Interactive message-locked encryption and secure deduplication. In Public-Key Cryptography - PKC 2015. LNCS, vol.9020, pp. 516{ 538, 2015.

    4. M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In Advances in Cryptology - EUROCRYPT 2013. LNCS, vol.7881, pp. 296{312, 2013.

    5. D. Boneh, A. Sahai, and B. Waters. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In Advances in Cryptology - EUROCRYPT 2006. LNCS vol. 4004, pp. 573{592, 2006.

    6. K. Chung and S. P. Vadhan. Tight bounds for hashing block sources. In APPROX 2008 RANDOM 2008. LNCS, vol.5171, pp. 357{370, 2008.

    7. L. P. Cox, C. D. Murray, and B. D. Noble. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and implementation, OSDI '02. ACM, pp. 285{298, 2002

    8. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate les in a serverless distributed le system. In ICDCS, pp. 617{624, 2002.

    9. A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identi cation and signature problems. In Advances in Cryptology { CRYPTO'86. LNCS, vol.263, pp. 186{194, 1986.

    10. The Flud backup system. http://

  • Related Organizations (1)
  • Metrics
Share - Bookmark