2013
DOI: 10.1007/978-3-642-40069-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Recoverable Encryption through a Noised Secret over a Large Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
23
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(23 citation statements)
references
References 19 publications
0
23
0
Order By: Relevance
“…As in [2], we call below each x a noise and I is the 1b. The noise shares form the noise share space, say Q, with card |Q| = card |I| = M. Each s is an integer, as we just said and can be s 0 .…”
Section: Backup Creationmentioning
confidence: 99%
See 4 more Smart Citations
“…As in [2], we call below each x a noise and I is the 1b. The noise shares form the noise share space, say Q, with card |Q| = card |I| = M. Each s is an integer, as we just said and can be s 0 .…”
Section: Backup Creationmentioning
confidence: 99%
“…Notice that, while the backup creation is quite similar to that in [2], the definition of noise shares differs. The rationale (that we do not plan to address further here) is a programmatically simpler discount calculation.…”
Section: Backup Creationmentioning
confidence: 99%
See 3 more Smart Citations