An identity-based online/offline secure cloud storage auditing scheme.
Reyhaneh RabaninejadMaryam Rajabzadeh AsaarMahmoud Ahmadian-AttariMohammad Reza ArefPublished in: Clust. Comput. (2020)
Keyphrases
- cloud storage
- ciphertext
- key distribution
- cca secure
- standard model
- private key
- proxy re encryption
- cloud computing
- encryption scheme
- identity based encryption
- key management
- provably secure
- diffie hellman
- signcryption scheme
- signature scheme
- blind signature
- blind signature scheme
- authentication protocol
- secret sharing scheme
- bilinear pairings
- identity based cryptography
- security model
- secret key
- distributed computing
- security analysis
- databases
- database
- statistical databases
- hash functions
- fault tolerant
- smart card
- low cost