Is extracting data the same as possessing data?

Proof-of-retrievability schemes have been a topic of considerable recent interest. In these schemes, a client 𝖢$\mathsf {C}$ gives a file M to a server 𝖲$\mathsf {S}$ with the understanding that 𝖲$\mathsf {S}$ will securely store M. A suitable challenge-response protocol is invoked by 𝖢$\mathsf {C}$...

Full description

Bibliographic Details
Main Authors: Stinson Douglas R., Upadhyay Jalaj
Format: Article
Language:English
Published: De Gruyter 2014-06-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2013-0034