Certificateless Public Auditing Protocol with Constant Verification Time
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Dongmin | - |
dc.contributor.author | Jeong, Ik Rae | - |
dc.date.accessioned | 2021-12-21T19:41:15Z | - |
dc.date.available | 2021-12-21T19:41:15Z | - |
dc.date.created | 2021-08-30 | - |
dc.date.issued | 2017 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/132444 | - |
dc.description.abstract | To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal securitymodels and prove the security of our scheme under the three security models. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | AUTHENTICATION SCHEME | - |
dc.subject | SIGNATURE SCHEME | - |
dc.subject | EFFICIENT | - |
dc.subject | SECURE | - |
dc.title | Certificateless Public Auditing Protocol with Constant Verification Time | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jeong, Ik Rae | - |
dc.identifier.doi | 10.1155/2017/6758618 | - |
dc.identifier.scopusid | 2-s2.0-85018713813 | - |
dc.identifier.wosid | 000399221800001 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, pp.1 - 14 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 14 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | AUTHENTICATION SCHEME | - |
dc.subject.keywordPlus | SIGNATURE SCHEME | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | SECURE | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.