Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...
Saved in:
Main Authors: | Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey of data possession provability proving on cloud storage
by: Wei FU, et al.
Published: (2012-11-01) -
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
by: Huaqun WANG, et al.
Published: (2021-07-01) -
Provable data possession scheme based on public verification and private verification
by: Junfeng TIAN, et al.
Published: (2019-03-01) -
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01) -
Certificateless public key cryptography based provable data possession scheme in edge environment
by: Ziyuan WANG, et al.
Published: (2022-07-01)