Range query integrity verification based on Merkle hash tree

被引:0
|
作者
机构
[1] [1,Zhao, Meng
[2] 1,Wang, Lei
[3] 1,Kuang, Linai
[4] Ye, Songtao
[5] 1,Liu, Dong
来源
| 1600年 / Southeast University卷 / 47期
关键词
10;
D O I
10.3969/j.issn.1001-0505.2017.S1.023
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [2] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 1793 - 1805
  • [3] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree
    Dipak Bhayyaji Khadse
    Gandharba Swain
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 1793 - 1805
  • [4] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [5] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [6] A variable block size integrity verification method based on Hash tree
    Ma, Haifeng
    Yao, Nianmin
    Fan, Hongbo
    Cai, Shaobin
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2011, 21 (11): : 1149 - 1156
  • [7] Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree
    He, Kai
    Shi, Jiaoli
    Huang, Chunxiao
    Hu, Xinrong
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 65 - 80
  • [8] Optimal parameter selection for efficient memory integrity verification using Merkle hash trees
    Williams, D
    Sirer, EG
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 383 - 388
  • [9] Certificate revocation system implementation based on the Merkle hash tree
    Jose L. Muñoz
    Jordi Forne
    Oscar Esparza
    Miguel Soriano
    [J]. International Journal of Information Security, 2004, 2 (2) : 110 - 124
  • [10] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
    Bai, Ping
    Zhang, Wei
    Wang, Xu An
    Liu, Yudong
    Yang, HaiBin
    Shan, Chun
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848