Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Certificateless Public Auditing Protocol with Constant Verification Time

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Dongmin-
dc.contributor.authorJeong, Ik Rae-
dc.date.accessioned2021-12-21T19:41:15Z-
dc.date.available2021-12-21T19:41:15Z-
dc.date.created2021-08-30-
dc.date.issued2017-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/132444-
dc.description.abstractTo provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal securitymodels and prove the security of our scheme under the three security models.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectAUTHENTICATION SCHEME-
dc.subjectSIGNATURE SCHEME-
dc.subjectEFFICIENT-
dc.subjectSECURE-
dc.titleCertificateless Public Auditing Protocol with Constant Verification Time-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.identifier.doi10.1155/2017/6758618-
dc.identifier.scopusid2-s2.0-85018713813-
dc.identifier.wosid000399221800001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, pp.1 - 14-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.startPage1-
dc.citation.endPage14-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusAUTHENTICATION SCHEME-
dc.subject.keywordPlusSIGNATURE SCHEME-
dc.subject.keywordPlusEFFICIENT-
dc.subject.keywordPlusSECURE-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE