{"id":"https://openalex.org/W2144731398","doi":"https://doi.org/10.1515/jmc-2013-5002","title":"A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage","display_name":"A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage","publication_year":2013,"publication_date":"2013-09-25","ids":{"openalex":"https://openalex.org/W2144731398","doi":"https://doi.org/10.1515/jmc-2013-5002","mag":"2144731398"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2013-5002","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-5002","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2013-5002/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2013-5002/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013118322","display_name":"Maura B. Paterson","orcid":"https://orcid.org/0000-0002-3515-8436"},"institutions":[{"id":"https://openalex.org/I98259816","display_name":"Birkbeck, University of London","ror":"https://ror.org/02mb95055","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I98259816"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Maura\u00a0B. Paterson","raw_affiliation_strings":["Department of Economics, Mathematics and Statistics, Birkbeck, University of London, Malet Street, London WC1E 7HX, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Economics, Mathematics and Statistics, Birkbeck, University of London, Malet Street, London WC1E 7HX, UK","institution_ids":["https://openalex.org/I98259816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021938024","display_name":"Douglas R. Stinson","orcid":"https://orcid.org/0000-0001-5635-8122"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Douglas\u00a0R. Stinson","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073803308","display_name":"Jalaj Upadhyay","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jalaj Upadhyay","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013118322"],"corresponding_institution_ids":["https://openalex.org/I98259816"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":1.672,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89308061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"7","issue":"3","first_page":"183","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/retrievability","display_name":"Retrievability","score":0.9051095247268677},{"id":"https://openalex.org/keywords/foundation","display_name":"Foundation (evidence)","score":0.5783865451812744},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5474128127098083},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.49341121315956116},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.47379180788993835},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4445784389972687},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3319220542907715},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32940226793289185},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.10845977067947388},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10064184665679932},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06425362825393677},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.053232938051223755}],"concepts":[{"id":"https://openalex.org/C191072391","wikidata":"https://www.wikidata.org/wiki/Q17043235","display_name":"Retrievability","level":3,"score":0.9051095247268677},{"id":"https://openalex.org/C2780966255","wikidata":"https://www.wikidata.org/wiki/Q5474306","display_name":"Foundation (evidence)","level":2,"score":0.5783865451812744},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5474128127098083},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.49341121315956116},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.47379180788993835},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4445784389972687},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3319220542907715},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32940226793289185},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.10845977067947388},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10064184665679932},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06425362825393677},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.053232938051223755},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2013-5002","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-5002","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2013-5002/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:228165b1074c41f482deef8289a0c68e","is_oa":true,"landing_page_url":"https://doaj.org/article/228165b1074c41f482deef8289a0c68e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 7, Iss 3, Pp 183-216 (2013)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2013-5002","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2013-5002","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2013-5002/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3691465044","display_name":null,"funder_award_id":"203114-11","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G634048639","display_name":null,"funder_award_id":"discovery grant 203114-11","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2144731398.pdf","grobid_xml":"https://content.openalex.org/works/W2144731398.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1480620864","https://openalex.org/W1536854407","https://openalex.org/W1589823702","https://openalex.org/W1606480398","https://openalex.org/W1994135885","https://openalex.org/W2058231031","https://openalex.org/W2072058615","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2799002609","https://openalex.org/W2949562265","https://openalex.org/W2951280401","https://openalex.org/W4254345397"],"related_works":["https://openalex.org/W107789802","https://openalex.org/W2601058089","https://openalex.org/W2960308993","https://openalex.org/W2789429590","https://openalex.org/W2596984514","https://openalex.org/W3131653338","https://openalex.org/W3003932861","https://openalex.org/W2911411232","https://openalex.org/W1991352533","https://openalex.org/W2949333899"],"abstract_inverted_index":{"Abstract.":[0],"There":[1],"has":[2,80,100],"been":[3],"considerable":[4],"recent":[5],"interest":[6],"in":[7,63,91,116,176,202],"\u201ccloud":[8],"storage\u201d":[9],"wherein":[10],"a":[11,14,18,39,81,117,122,143,150,166,189,193,210,221,256],"user":[12,26,47],"asks":[13],"server":[15,31],"to":[16,44,140,158,184,196,238,249],"store":[17],"large":[19],"file.":[20],"One":[21],"issue":[22],"is":[23,32,42,51,61],"whether":[24,240],"the":[25,30,35,46,49,73,92,109,146,170,186,217,241,244],"can":[27,111,235],"verify":[28],"that":[29,48,79,129,134],"actually":[33],"storing":[34],"file,":[36],"and":[37,153,181,198,262],"typically":[38],"challenge-response":[40],"protocol":[41],"employed":[43],"convince":[45],"file":[50,74,110],"indeed":[52],"being":[53],"stored":[54],"correctly.":[55],"The":[56],"security":[57,187],"of":[58,65,94,108,145,149,172,188,192,220,243,265],"these":[59],"schemes":[60,90,128,175],"phrased":[62],"terms":[64],"an":[66,98,177],"extractor":[67],"which":[68],"will":[69],"recover":[70],"or":[71],"retrieve":[72],"given":[75],"any":[76],"\u201cproving":[77],"algorithm\u201d":[78],"sufficiently":[82],"high":[83],"success":[84,147],"probability.":[85],"This":[86],"paper":[87],"treats":[88],"proof-of-retrievability":[89],"model":[93],"unconditional":[95,226],"security,":[96],"where":[97],"adversary":[99],"unlimited":[101],"computational":[102],"power.":[103],"In":[104,162],"this":[105,156],"case":[106],"retrievability":[107],"be":[112,236],"modelled":[113],"as":[114,142],"error-correction":[115],"certain":[118],"code.":[119],"We":[120,228],"provide":[121,165],"general":[123],"analytical":[124],"framework":[125],"for":[126,138,169],"such":[127],"yields":[130],"exact":[131],"(non-asymptotic)":[132],"reductions":[133],"precisely":[135],"quantify":[136],"conditions":[137],"extraction":[139],"succeed":[141],"function":[144],"probability":[148],"proving":[151],"algorithm,":[152],"we":[154,164,254],"apply":[155],"analysis":[157,171],"several":[159],"archetypal":[160],"schemes.":[161,267],"addition,":[163],"new":[167,257],"methodology":[168],"keyed":[173,222],"POR":[174,223,266],"unconditionally":[178],"secure":[179],"setting,":[180],"use":[182],"it":[183],"prove":[185,255],"modified":[190],"version":[191],"scheme":[194,224],"due":[195],"Shacham":[197],"Waters":[199],"[Lecture":[200],"Notes":[201],"Comput.":[203],"Sci.":[204],"5350,":[205],"Springer":[206],"(2008),":[207],"90\u2013107]":[208],"under":[209],"slightly":[211],"restricted":[212],"attack":[213],"model,":[214],"thus":[215],"providing":[216],"first":[218],"example":[219],"with":[225],"security.":[227],"also":[229],"show":[230],"how":[231],"classical":[232],"statistical":[233],"techniques":[234],"used":[237],"evaluate":[239],"responses":[242],"prover":[245],"are":[246],"accurate":[247],"enough":[248],"permit":[250],"successful":[251],"extraction.":[252],"Finally,":[253],"lower":[258],"bound":[259],"on":[260],"storage":[261],"communication":[263],"complexity":[264]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2016-06-24T00:00:00"}
