{"id":"https://openalex.org/W2292320942","doi":"https://doi.org/10.1007/978-3-319-24174-6_11","title":"Symmetric-Key Based Proofs of Retrievability Supporting Public Verification","display_name":"Symmetric-Key Based Proofs of Retrievability Supporting Public Verification","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2292320942","doi":"https://doi.org/10.1007/978-3-319-24174-6_11","mag":"2292320942"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-24174-6_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_11","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_11.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110565041","display_name":"Chaowen Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chaowen Guan","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005731945","display_name":"Fangguo Zhang","orcid":"https://orcid.org/0000-0002-0486-6413"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Fangguo Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA","Guangdong Key Laboratory of Information Security Technology, Guangzhou, China","School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[{"id":"https://openalex.org/I4210119349","display_name":"Karlsruhe University of Education","ror":"https://ror.org/01t1kq612","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210119349"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210119349"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]},{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"education","lineage":["https://openalex.org/I108688024"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Information Engineering, Qingdao University, Qingdao, China","Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Qingdao University, Qingdao, China","institution_ids":["https://openalex.org/I108688024"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110565041"],"corresponding_institution_ids":["https://openalex.org/I63190737"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":7.842,"has_fulltext":true,"cited_by_count":69,"citation_normalized_percentile":{"value":0.97937139,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"203","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8642512559890747},{"id":"https://openalex.org/keywords/retrievability","display_name":"Retrievability","score":0.8006598949432373},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.582977294921875},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5479854345321655},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5260583758354187},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5046321153640747},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4496687650680542},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38906407356262207},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.13703399896621704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8642512559890747},{"id":"https://openalex.org/C191072391","wikidata":"https://www.wikidata.org/wiki/Q17043235","display_name":"Retrievability","level":3,"score":0.8006598949432373},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.582977294921875},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5479854345321655},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5260583758354187},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5046321153640747},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4496687650680542},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38906407356262207},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.13703399896621704},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-24174-6_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_11","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:zenodo.org:60283","is_oa":true,"landing_page_url":"https://zenodo.org/record/60283","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"doi:10.1007/978-3-319-24174-6_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_11","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1441077647","display_name":"CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing","funder_award_id":"1262277","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2589659186","display_name":null,"funder_award_id":"U1135001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6435722614","display_name":null,"funder_award_id":"61379154","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6471729477","display_name":null,"funder_award_id":"U1135001","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7469032032","display_name":null,"funder_award_id":"CNS-1262277","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2292320942.pdf","grobid_xml":"https://content.openalex.org/works/W2292320942.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W7540341","https://openalex.org/W16762060","https://openalex.org/W44164607","https://openalex.org/W89553247","https://openalex.org/W167928972","https://openalex.org/W184028394","https://openalex.org/W288529411","https://openalex.org/W1480620864","https://openalex.org/W1501402336","https://openalex.org/W1557386445","https://openalex.org/W1558353365","https://openalex.org/W1603256047","https://openalex.org/W1659280461","https://openalex.org/W1802540854","https://openalex.org/W1963071371","https://openalex.org/W1969800190","https://openalex.org/W1984153141","https://openalex.org/W2026450784","https://openalex.org/W2027703952","https://openalex.org/W2037092970","https://openalex.org/W2040193872","https://openalex.org/W2054904172","https://openalex.org/W2058231031","https://openalex.org/W2079493184","https://openalex.org/W2084462505","https://openalex.org/W2084641398","https://openalex.org/W2095417570","https://openalex.org/W2102881299","https://openalex.org/W2136936712","https://openalex.org/W2144140331","https://openalex.org/W2148888468","https://openalex.org/W2159460804","https://openalex.org/W2166561215","https://openalex.org/W2396513659","https://openalex.org/W3031365452"],"related_works":["https://openalex.org/W107789802","https://openalex.org/W2601058089","https://openalex.org/W2081280752","https://openalex.org/W1482839591","https://openalex.org/W272194934","https://openalex.org/W2062709414","https://openalex.org/W4394650907","https://openalex.org/W2034977219","https://openalex.org/W2017702024","https://openalex.org/W154364797"],"abstract_inverted_index":{"Proofs-of-Retrievability":[0],"enables":[1],"a":[2,9,51,100,120,175,200,207],"client":[3,164],"to":[4,20,46,58],"store":[5],"his":[6,28],"data":[7,29,45,56,224],"on":[8,105,132,222],"cloud":[10],"server":[11,24,37,229],"so":[12],"that":[13,22,88,123,182,216],"he":[14],"executes":[15],"an":[16,34],"efficient":[17],"auditing":[18],"protocol":[19],"check":[21],"the":[23,31,36,43,55,62,85,128,145,183,223,228],"possesses":[25],"all":[26,84],"of":[27,42,54,77,147,203],"in":[30,154],"future.":[32],"During":[33],"audit,":[35],"must":[38],"maintain":[39],"full":[40],"knowledge":[41],"client\u2019s":[44],"pass,":[47],"even":[48],"though":[49],"only":[50],"few":[52],"blocks":[53],"need":[57],"be":[59,152,168],"accessed.":[60],"Since":[61],"first":[63],"work":[64,113],"by":[65,162,170],"Juels":[66],"and":[67,75,142,165,206,227],"Kaliski,":[68],"many":[69],"PoR":[70],"schemes":[71,213],"have":[72],"been":[73],"proposed":[74,184,196],"some":[76],"them":[78],"can":[79,167,186],"support":[80,187],"dynamic":[81,188],"updates.":[82,189],"However,":[83],"existing":[86,212],"works":[87],"achieve":[89],"public":[90,125],"verifiability":[91],"are":[92],"built":[93],"upon":[94],"traditional":[95],"public-key":[96],"cryptosystems":[97],"which":[98,214],"imposes":[99],"relatively":[101],"high":[102],"computational":[103],"burden":[104],"low-power":[106,163],"clients":[107],"(e.g.,":[108,174],"mobile":[109],"devices).":[110],"In":[111],"this":[112],"we":[114,198],"explore":[115],"indistinguishability":[116],"obfuscation":[117],"for":[118,192],"building":[119],"Proof-of-Retrievability":[121],"scheme":[122,138,185,205,218],"provides":[124],"verification":[126],"while":[127],"encryption":[129],"is":[130,159],"based":[131],"symmetric":[133],"key":[134],"primitives.":[135],"The":[136],"resulting":[137],"offers":[139],"light-weight":[140],"storing":[141],"proving":[143],"at":[144],"expense":[146],"longer":[148],"verification.":[149],"This":[150],"could":[151],"useful":[153],"apations":[155],"where":[156],"outsourcing":[157],"files":[158],"usually":[160],"done":[161,169],"verifications":[166],"well":[171],"equipped":[172],"machines":[173],"third":[176],"party":[177],"server).":[178],"We":[179],"also":[180],"show":[181],"At":[190],"last,":[191],"better":[193,220],"assessing":[194],"our":[195,204,217],"scheme,":[197],"give":[199],"performance":[201,221],"analysis":[202],"comparison":[208],"with":[209],"several":[210],"other":[211],"demonstrates":[215],"achieves":[219],"owner":[225],"side":[226],"side.":[230]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
