{"id":"https://openalex.org/W2071803996","doi":"https://doi.org/10.1515/jmc-2013-0034","title":"Is extracting data the same as possessing data?","display_name":"Is extracting data the same as possessing data?","publication_year":2014,"publication_date":"2014-01-24","ids":{"openalex":"https://openalex.org/W2071803996","doi":"https://doi.org/10.1515/jmc-2013-0034","mag":"2071803996"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2013-0034","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-0034","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1515/jmc-2013-0034","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021938024","display_name":"Douglas R. Stinson","orcid":"https://orcid.org/0000-0001-5635-8122"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Douglas R. Stinson","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073803308","display_name":"Jalaj Upadhyay","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jalaj Upadhyay","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021938024"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.8199,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82874033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":"2","first_page":"189","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42691856622695923},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.42580530047416687},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4194387197494507},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3305779695510864}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42691856622695923},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.42580530047416687},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4194387197494507},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3305779695510864}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2013-0034","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-0034","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2fc83a13065c49e2bd0bf30e1099114a","is_oa":true,"landing_page_url":"https://doaj.org/article/2fc83a13065c49e2bd0bf30e1099114a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 8, Iss 2, Pp 189-207 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2013-0034","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-0034","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3691465044","display_name":null,"funder_award_id":"203114-11","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1480620864","https://openalex.org/W1502433349","https://openalex.org/W1562728823","https://openalex.org/W1589823702","https://openalex.org/W1619166970","https://openalex.org/W2002501531","https://openalex.org/W2052267638","https://openalex.org/W2058231031","https://openalex.org/W2072058615","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2106747585"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027"],"abstract_inverted_index":{"Abstract.":[0],"Proof-of-retrievability":[1],"schemes":[2,94,179],"have":[3,158],"been":[4],"a":[5,14,23,27,120,130,138],"topic":[6],"of":[7,92,100,123,133,162,178,194,208,211],"considerable":[8],"recent":[9],"interest.":[10],"In":[11,125],"these":[12,209],"schemes,":[13],"client":[15],"<m:math":[16,29,39,57,66,83,103,151],"xmlns:m=\"http://www.w3.org/1998/Math/MathML\">":[17,30,40,58,67,84,104,152],"<m:mi>\ud835\udda2</m:mi>":[18,59,68],"</m:math>":[19,32,42,60,69,86,106,154],"$\\mathsf":[20,33,43,61,70,87,155],"{C}$":[21,62,71],"gives":[22],"file":[24,113],"M":[25,48,76,163],"to":[26,72,145],"server":[28],"<m:mi>\ud835\uddb2</m:mi>":[31,41,85,153],"{S}$":[34,44,88,156],"with":[35],"the":[36,98,112,115,147,171,190,195,206],"understanding":[37],"that":[38,75,109,135,150,180],"will":[45],"securely":[46],"store":[47],".":[49,89,141],"A":[50],"suitable":[51],"challenge-response":[52,116,172],"protocol":[53,117],"is":[54,77,95,118],"invoked":[55],"by":[56,82],"in":[63,164],"order":[64],"for":[65,205],"gain":[73],"confidence":[74],"indeed":[78],"being":[79],"correctly":[80],"stored":[81],"The":[90],"definition":[91,143],"proof-of-retrievability":[93],"based":[96],"on":[97],"notion":[99],"an":[101,159],"extractor":[102],"<m:mi>\u2130</m:mi>":[105],"$\\mathcal":[107],"{E}$":[108],"can":[110],"recover":[111],"once":[114],"executed":[119],"sufficient":[121],"number":[122],"times.":[124],"this":[126,182],"paper,":[127],"we":[128,136,188,197,200],"propose":[129],"new":[131,183],"type":[132],"scheme":[134,140],"term":[137],"proof-of-data-observability":[139],"Our":[142],"tries":[144],"capture":[146],"stronger":[148],"requirement":[149],"must":[157],"actual":[160],"copy":[161],"its":[165],"memory":[166],"space":[167],"while":[168],"it":[169],"executes":[170],"protocol.":[173],"We":[174],"give":[175],"some":[176,202],"examples":[177],"satisfy":[181],"security":[184,193],"definition.":[185],"As":[186],"well,":[187],"analyze":[189],"efficiency":[191],"and":[192,199],"protocols":[196],"present,":[198],"prove":[201],"necessary":[203],"conditions":[204],"existence":[207],"kinds":[210],"protocols.":[212]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
