Provable data possession scheme with authentication

To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...

Full description

Saved in:
Bibliographic Details
Main Authors: Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items