De-duplication on the authenticators used for Proofs of Retrievability across multiple users. Relying on key-message homomorphic encryption, the cloud providers are able to merge the PoR authenticators generated by different users using different credentials and the merged authenticators is verifiable by all users.
Security Primitive:
Deduplication and PoR
Cloud:
Security Requirements Addressed:
Contact:
NECLE
Source Code: