{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:59:27Z","timestamp":1768017567306,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319769523","type":"print"},{"value":"9783319769530","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76953-0_20","type":"book-chapter","created":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T03:13:36Z","timestamp":1520306016000},"page":"374-393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Secure Deduplication of Encrypted Data: Refined Model and New Constructions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6796-6828","authenticated-orcid":false,"given":"Jian","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8383-0776","authenticated-orcid":false,"given":"Li","family":"Duan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6920-0663","authenticated-orcid":false,"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5093-9871","authenticated-orcid":false,"given":"N.","family":"Asokan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,7]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-662-46447-2_23","volume-title":"Public-Key Cryptography \u2013 PKC 2015","author":"M Bellare","year":"2015","unstructured":"Bellare, M., Keelveedhi, S.: Interactive message-locked encryption and secure deduplication. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 516\u2013538. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46447-2_23"},{"key":"20_CR3","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: USENIX Security, pp. 179\u2013194. USENIX Association (2013)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-38348-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Bellare","year":"2013","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296\u2013312. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-38348-9_18"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-45539-6_11"},{"key":"20_CR6","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Proceedings, pp. 72\u201384, May 1992"},{"issue":"1","key":"20_CR7","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Int. Res. 16(1), 321\u2013357 (2002)","journal-title":"J. Artif. Int. Res."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Douceur, J., Adya, A., Bolosky, W., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: 22nd International Conference on Distributed Computing Systems, Proceedings, pp. 617\u2013624 (2002)","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Duan, Y.: Distributed key generation for encrypted deduplication: achieving the strongest privacy. In: CCSW, pp. 57\u201368. ACM (2014)","DOI":"10.1145\/2664168.2664169"},{"issue":"6","key":"20_CR10","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40\u201347 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-50011-9_6","volume-title":"Information and Communications Security","author":"L Lei","year":"2016","unstructured":"Lei, L., Cai, Q., Chen, B., Lin, J.: Towards efficient re-encryption for secure client-side deduplication in public clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 71\u201384. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-50011-9_6"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 874\u2013885. ACM, New York (2015)","DOI":"10.1145\/2810103.2813623"},{"key":"20_CR13","unstructured":"Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. Cryptology ePrint Archive, Report 2015\/455 (2015). \nhttp:\/\/eprint.iacr.org\/2015\/455"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: CloudCom, pp. 363\u2013370. IEEE Computer Society (2013)","DOI":"10.1109\/CloudCom.2013.54"},{"issue":"1","key":"20_CR15","first-page":"9:1","volume":"13","author":"C Qin","year":"2017","unstructured":"Qin, C., Li, J., Lee, P.P.C.: The design and implementation of a rekeying-aware encrypted deduplication storage system. Trans. Storage 13(1), 9:1\u20139:30 (2017)","journal-title":"Trans. Storage"},{"issue":"99","key":"20_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSC.2017.2748594","volume":"PP","author":"Y Shin","year":"2017","unstructured":"Shin, Y., Koo, D., Yun, J., Hur, J.: Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans. Serv. Comput. PP(99), 1 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"20_CR17","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive 2004:332 (2004)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: FC, pp. 99\u2013118 (2014)","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chow, S.S.: Updatable block-level message-locked encryption. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 449\u2013460. ACM, New York (2017)","DOI":"10.1145\/3052973.3053012"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76953-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T03:26:08Z","timestamp":1520306768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76953-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319769523","9783319769530"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76953-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}