1. Provable data possession at untrusted stores;Ateniese,2007
2. Transparent data deduplication in the cloud;Armknecht,2015
3. The design and implementation of a rekeying-aware encrypted deduplication storage system;Qin;TOS,2017
4. Information leakage in encrypted deduplication via frequency analysis;Li,2017
5. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, 2009. https://bitcoin.org/bitcoin.pdf.