Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

quantum computer attacks

biblio

Visible to the public Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices

Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
  • lost attack
  • verification stage
  • tamper attack
  • storage management
  • Servers
  • Scalability
  • Resiliency
  • remote data integrity checking protocols
  • quantum computer attacks
  • public key cryptography
  • pubcrawl
  • provably secure
  • Protocols
  • matrix-vector multiplication
  • matrix multiplication
  • matrix-matrix multiplication
  • Cloud Computing
  • Lattices
  • lattice-based constructed cryptography
  • Identity management
  • identity-based remote data integrity checking protocol
  • ID-Based cryptography
  • Human behavior
  • data privacy
  • Data models
  • data integrity checking
  • data integrity
  • Cryptography
  • Cryptographic Protocols
  • communication cost
  • cloud storage
  • cloud service provider attack

Terms of Use  |  ©2023. CPS-VO