Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an ident...
Saved in:
Main Authors: | Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
by: Lei HE, et al.
Published: (2021-11-01) -
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Revocable identity-based proxy re-signature scheme in the standard model
by: Xiaodong YANG, et al.
Published: (2019-05-01)