2015
DOI: 10.1016/j.ipl.2015.02.014
|View full text |Cite
|
Sign up to set email alerts
|

Locating modifications in signed data for partial data integrity

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 8 publications
(20 reference statements)
0
2
0
Order By: Relevance
“…rough the above security game model, we get the following security definition of data integrity verification scheme: if a data integrity verification scheme is secure, the probability of winning the above game for any opponent with probability polynomial time is negligible, and this probability is equal to the probability of obtaining all the data by using the message collector [22].…”
Section: Security Model Of Data Integrity Verification Schemementioning
confidence: 99%
“…rough the above security game model, we get the following security definition of data integrity verification scheme: if a data integrity verification scheme is secure, the probability of winning the above game for any opponent with probability polynomial time is negligible, and this probability is equal to the probability of obtaining all the data by using the message collector [22].…”
Section: Security Model Of Data Integrity Verification Schemementioning
confidence: 99%
“…A d-cover-free family (or d-CFF) indicates how to group the n elements into t groups (t ≤ n), and by performing only t tests we are able to identify up to d defective elements. These families are used to solve several problems in cryptography, such as one-time and multiple-times digital signature schemes [15,25], faulttolerant aggregation of signatures [8,9,24], localization of modifications on signed documents and redactable signatures [10], broadcast authentication [17], broadcast encryption [7], frameproof and traceability codes [18,20], among others [13].…”
Section: Introductionmentioning
confidence: 99%