AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all...
Saved in:
Main Authors: | Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021187/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Data popularity-based encrypted deduplication scheme without third-party servers
by: Guanxiong HA, et al.
Published: (2022-08-01) -
Data access control policy of encrypted deduplication system
by: Chunfu JIA, et al.
Published: (2020-05-01) -
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01) -
Block level cloud data deduplication scheme based on attribute encryption
by: Wenting GE, et al.
Published: (2023-10-01) -
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
by: Xiangsong ZHANG, et al.
Published: (2019-04-01)