1. Outsourced Proofs of Retrievability
2. Provable data possession at untrusted stores
3. Giuseppe Ateniese , Long Chen , Mohammad Etemad , and Qiang Tang . 2020. Proof of Storage-Time: Efficiently Checking Continuous Data Availability . In 27th Annual Network and Distributed System Security Symposium. https://www.ndss-symposium.org/ndss-paper/proof-of-storage-time-efficiently-checking-continuous-data-availability/ Giuseppe Ateniese, Long Chen, Mohammad Etemad, and Qiang Tang. 2020. Proof of Storage-Time: Efficiently Checking Continuous Data Availability. In 27th Annual Network and Distributed System Security Symposium. https://www.ndss-symposium.org/ndss-paper/proof-of-storage-time-efficiently-checking-continuous-data-availability/
4. Juan Benet . 2014. IPFS - Content Addressed , Versioned, P2P File System. ArXiv abs/1407.3561 ( 2014 ). Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. ArXiv abs/1407.3561 (2014).
5. Dan Boneh , Joseph Bonneau , Benedikt Bünz , and Ben Fisch . 2018. Verifiable delay functions . In Annual international cryptology conference . Springer , 757–788. Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch. 2018. Verifiable delay functions. In Annual international cryptology conference. Springer, 757–788.