Certificateless Public Auditing Protocol with Constant Verification Time
- Authors
- Kim, Dongmin; Jeong, Ik Rae
- Issue Date
- 2017
- Publisher
- WILEY-HINDAWI
- Citation
- SECURITY AND COMMUNICATION NETWORKS, pp.1 - 14
- Indexed
- SCIE
SCOPUS
- Journal Title
- SECURITY AND COMMUNICATION NETWORKS
- Start Page
- 1
- End Page
- 14
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/132444
- DOI
- 10.1155/2017/6758618
- ISSN
- 1939-0114
- Abstract
- To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal securitymodels and prove the security of our scheme under the three security models.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.