{"id":"https://openalex.org/W1618436855","doi":"https://doi.org/10.1109/isit.2015.7282724","title":"STEP-archival: Storage integrity and anti-tampering using data entanglement","display_name":"STEP-archival: Storage integrity and anti-tampering using data entanglement","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1618436855","doi":"https://doi.org/10.1109/isit.2015.7282724","mag":"1618436855"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2015.7282724","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2015.7282724","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034349324","display_name":"Hugues Mercier","orcid":"https://orcid.org/0000-0001-9348-4515"},"institutions":[{"id":"https://openalex.org/I57825437","display_name":"University of Neuch\u00e2tel","ror":"https://ror.org/00vasag41","country_code":"CH","type":"education","lineage":["https://openalex.org/I57825437"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Hugues Mercier","raw_affiliation_strings":["Institute of Computer Science, Universit\u00e9 de Neuch\u00e2tel, Switzerland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Universit\u00e9 de Neuch\u00e2tel, Switzerland","institution_ids":["https://openalex.org/I57825437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070020394","display_name":"Maxime Augier","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Maxime Augier","raw_affiliation_strings":["IC LACAL, EPFL, Switzerland"],"affiliations":[{"raw_affiliation_string":"IC LACAL, EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109240185","display_name":"Arjen K. Lenstra","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Arjen K. Lenstra","raw_affiliation_strings":["IC LACAL, EPFL, Switzerland"],"affiliations":[{"raw_affiliation_string":"IC LACAL, EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034349324"],"corresponding_institution_ids":["https://openalex.org/I57825437"],"apc_list":null,"apc_paid":null,"fwci":1.6641,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85381519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1590","last_page":"1594"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collateral-damage","display_name":"Collateral damage","score":0.8263167142868042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.748849630355835},{"id":"https://openalex.org/keywords/collateral","display_name":"Collateral","score":0.7106869220733643},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6293464303016663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5645620226860046},{"id":"https://openalex.org/keywords/data-redundancy","display_name":"Data redundancy","score":0.5541679263114929},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5124700665473938},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4913131296634674},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.4455747604370117},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4435043931007385},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.4186321496963501},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.1612652838230133},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.15704265236854553},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13273102045059204}],"concepts":[{"id":"https://openalex.org/C2993632694","wikidata":"https://www.wikidata.org/wiki/Q45939","display_name":"Collateral damage","level":2,"score":0.8263167142868042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.748849630355835},{"id":"https://openalex.org/C2777910564","wikidata":"https://www.wikidata.org/wiki/Q694563","display_name":"Collateral","level":2,"score":0.7106869220733643},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6293464303016663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5645620226860046},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.5541679263114929},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5124700665473938},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4913131296634674},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.4455747604370117},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4435043931007385},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.4186321496963501},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.1612652838230133},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.15704265236854553},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13273102045059204},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2015.7282724","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2015.7282724","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W100863554","https://openalex.org/W134083019","https://openalex.org/W1542237764","https://openalex.org/W1549262233","https://openalex.org/W1580004440","https://openalex.org/W1985405465","https://openalex.org/W2000931465","https://openalex.org/W2095763432","https://openalex.org/W2147587452","https://openalex.org/W2148574175","https://openalex.org/W2163598690","https://openalex.org/W2174507869","https://openalex.org/W2402681980","https://openalex.org/W2407617521","https://openalex.org/W6604066429","https://openalex.org/W6605455666","https://openalex.org/W6634670644","https://openalex.org/W6683798602"],"related_works":["https://openalex.org/W2356569977","https://openalex.org/W1618436855","https://openalex.org/W2007610702","https://openalex.org/W2389039377","https://openalex.org/W2077135008","https://openalex.org/W4318604572","https://openalex.org/W2052770748","https://openalex.org/W2911294821","https://openalex.org/W2605316923","https://openalex.org/W3116532372"],"abstract_inverted_index":{"We":[0,45,59],"present":[1,83],"STEP-archives,":[2],"a":[3,20,47],"model":[4],"for":[5,49],"censorship-resistant":[6],"storage":[7,43],"systems":[8],"where":[9],"an":[10],"attacker":[11,51],"cannot":[12],"censor":[13],"or":[14],"tamper":[15],"with":[16,70],"data":[17,35],"without":[18],"causing":[19],"large":[21],"amount":[22],"of":[23],"obvious":[24],"collateral":[25,57],"damage.":[26,58],"MDS":[27],"erasure":[28],"codes":[29],"are":[30,89],"used":[31],"to":[32,39,105],"entangle":[33],"unrelated":[34],"blocks,":[36],"in":[37],"addition":[38],"providing":[40],"redundancy":[41],"against":[42],"failures.":[44],"show":[46,61],"tradeoff":[48],"the":[50,63,74],"between":[52,77],"attack":[53,86],"complexity,":[54],"irrecoverability,":[55,72],"and":[56,79,91,96,101],"also":[60],"that":[62,88],"system":[64],"can":[65],"efficiently":[66],"recover":[67],"from":[68],"attacks":[69],"imperfect":[71],"making":[73],"problem":[75],"asymmetric":[76],"attackers":[78],"defenders.":[80],"Finally,":[81],"we":[82],"sample":[84,108],"heuristic":[85],"algorithms":[87],"efficient":[90],"irrecoverable":[92],"(but":[93],"not":[94],"collateral-damage-optimal),":[95],"demonstrate":[97],"how":[98],"some":[99],"strategies":[100],"parameter":[102],"choices":[103],"allow":[104],"resist":[106],"these":[107],"attacks.":[109]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
