Is extracting data the same as possessing data?
Proof-of-retrievability schemes have been a topic of considerable recent interest. In these schemes, a client 𝖢$\mathsf {C}$ gives a file M to a server 𝖲$\mathsf {S}$ with the understanding that 𝖲$\mathsf {S}$ will securely store M. A suitable challenge-response protocol is invoked by 𝖢$\mathsf {C}$...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2014-06-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2013-0034 |