Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suit...
Saved in:
Main Authors: | Ziyuan WANG, Ruizhong DU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022130/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
by: Zhi-yan XU, et al.
Published: (2017-07-01) -
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
by: Huaqun WANG, et al.
Published: (2021-07-01) -
Efficient and provably-secure certificateless sequential aggregate signature scheme
by: Zhu WANG, et al.
Published: (2022-05-01) -
Provable data possession scheme with authentication
by: Hao-xing LI, et al.
Published: (2016-10-01) -
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01)