A formal treatment of end-to-end encrypted cloud storage
From MaRDI portal
Publication:6648201
DOI10.1007/978-3-031-68379-4_2MaRDI QIDQ6648201
Felix Günther, Kenneth G. Paterson, Miro Haller, Matilda Backendal, Hannah Davis
Publication date: 4 December 2024
Cites Work
- Title not available (Why is that?)
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- On the limitations of universally composable two-party computation without set-up assumptions
- Multi-instance Security and Its Application to Password-Based Cryptography
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Theory of Cryptography
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications
- Puncturable key wrapping and its applications
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF
- A formal treatment of end-to-end encrypted cloud storage
Related Items (1)
This page was built for publication: A formal treatment of end-to-end encrypted cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6648201)