Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Libing WuJing WangDebiao HeMuhammad Khurram KhanPublished in: Frontiers Inf. Technol. Electron. Eng. (2017)
Keyphrases
- cloud storage
- ciphertext
- secret key
- key distribution
- signature scheme
- authentication protocol
- provably secure
- standard model
- encryption scheme
- cloud computing
- public key
- smart card
- encrypted data
- key management
- s box
- file system
- distributed computing
- pseudorandom
- hash functions
- encryption algorithm
- security model
- access control
- data management
- lightweight
- security analysis
- statistical databases
- data center
- databases