[go: up one dir, main page]

Salvakkam et al., 2023 - Google Patents

An improved lattice based certificateless data integrity verification techniques for cloud computing

Salvakkam et al., 2023

Document ID
12425160607810888242
Author
Salvakkam D
Pamula R
Publication year
Publication venue
Journal of Ambient Intelligence and Humanized Computing

External Links

Snippet

Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be overlooked in present advancement. As a result of the difficulty involved in verifying and enforcing digital signatures, classic …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Esgin et al. Practical post-quantum few-time verifiable random function with applications to algorand
Li et al. CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage
Daniel et al. LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
Garg et al. Comparative analysis of cloud data integrity auditing protocols
Salvakkam et al. An improved lattice based certificateless data integrity verification techniques for cloud computing
Ma et al. CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud
Gowda et al. BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
Miao et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings
Hariharasitaraman et al. A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Salvakkam et al. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment
Tian et al. Secure limitation analysis of public-key cryptography for smart card settings
Guo et al. An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
Han et al. TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
Alimohammadi et al. A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
Zhu et al. Secure collaborative integrity verification for hybrid cloud environments
Hossain et al. LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator
Lodder Token based authentication and authorization with zero-knowledge proofs for enhancing Web API security and privacy
Xu et al. SPCSS: Social network based privacy-preserving criminal suspects sensing
Sharma et al. Multiuser searchable encryption with token freshness verification
Tang et al. Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack
Zhou et al. A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique
Rehman et al. Securing cloud storage by remote data integrity check with secured key generation
Zhou Data security and integrity in cloud computing
Tang et al. Enabling authorized fine-grained data retrieval over aggregated encrypted medical data in cloud-assisted e-health systems