Salvakkam et al., 2023 - Google Patents
An improved lattice based certificateless data integrity verification techniques for cloud computingSalvakkam et al., 2023
- Document ID
- 12425160607810888242
- Author
- Salvakkam D
- Pamula R
- Publication year
- Publication venue
- Journal of Ambient Intelligence and Humanized Computing
External Links
Snippet
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be overlooked in present advancement. As a result of the difficulty involved in verifying and enforcing digital signatures, classic …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Esgin et al. | Practical post-quantum few-time verifiable random function with applications to algorand | |
| Li et al. | CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage | |
| Daniel et al. | LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment | |
| Garg et al. | Comparative analysis of cloud data integrity auditing protocols | |
| Salvakkam et al. | An improved lattice based certificateless data integrity verification techniques for cloud computing | |
| Ma et al. | CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud | |
| Gowda et al. | BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments | |
| Miao et al. | VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings | |
| Hariharasitaraman et al. | A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud | |
| Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
| Salvakkam et al. | Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment | |
| Tian et al. | Secure limitation analysis of public-key cryptography for smart card settings | |
| Guo et al. | An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability | |
| Han et al. | TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage | |
| Alimohammadi et al. | A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage | |
| Zhu et al. | Secure collaborative integrity verification for hybrid cloud environments | |
| Hossain et al. | LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator | |
| Lodder | Token based authentication and authorization with zero-knowledge proofs for enhancing Web API security and privacy | |
| Xu et al. | SPCSS: Social network based privacy-preserving criminal suspects sensing | |
| Sharma et al. | Multiuser searchable encryption with token freshness verification | |
| Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack | |
| Zhou et al. | A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique | |
| Rehman et al. | Securing cloud storage by remote data integrity check with secured key generation | |
| Zhou | Data security and integrity in cloud computing | |
| Tang et al. | Enabling authorized fine-grained data retrieval over aggregated encrypted medical data in cloud-assisted e-health systems |