• Publications
  • Influence
Provable data possession at untrusted stores
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.Expand
  • 2,530
  • 305
  • PDF
Improved proxy re-encryption schemes with applications to secure distributed storage
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob withoutExpand
  • 1,345
  • 105
  • PDF
Scalable and efficient provable data possession
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is aExpand
  • 1,200
  • 83
  • PDF
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature's originator can be revealed (only)Expand
  • 842
  • 75
  • PDF
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in theExpand
  • 502
  • 75
  • PDF
Visual Cryptography for General Access Structures
A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualifiedExpand
  • 664
  • 56
  • PDF
Remote data checking using provable data possession
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses theExpand
  • 355
  • 43
  • PDF
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Deep Learning has recently become hugely popular in machine learning for its ability to solve end-to-end learning systems, in which the features and the classifiers are learned simultaneously,Expand
  • 314
  • 41
  • PDF
MR-PDP: Multiple-Replica Provable Data Possession
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multipleExpand
  • 475
  • 33
  • PDF
Extended capabilities for visual cryptography
An extended visual cryptography scheme (EVCS), for an access structure (ΓQual,ΓForb) on a set of n participants, is a technique to encode n images in such a way that when we stack together theExpand
  • 421
  • 30