Login / Signup

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators.

Dongxi LiuJohn Zic
Published in: TrustCom/BigDataSE/ISPA (1) (2015)
Keyphrases
  • encryption scheme
  • privacy preserving
  • dynamic allocation
  • database systems
  • first order logic
  • cost effective
  • third party
  • sensitive data
  • data privacy