Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing...
Saved in:
Main Authors: | Zhang, Xiaojun, Wang, Huaxiong, Xu, Chunxiang |
---|---|
其他作者: | School of Physical and Mathematical Sciences |
格式: | Article |
語言: | English |
出版: |
2021
|
主題: | |
在線閱讀: | https://hdl.handle.net/10356/151363 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Nanyang Technological University |
語言: | English |
相似書籍
-
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
由: XU, Shengmin, et al.
出版: (2019) -
FS-PEKS : lattice-based forward secure public-key encryption with keyword search for cloud-assisted Industrial Internet of Things
由: Zhang, Xiaojun, et al.
出版: (2021) -
Identity-based data outsourcing with comprehensive auditing in clouds
由: WANG, Yujue, et al.
出版: (2017) -
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud
由: HONG, Hanshu, et al.
出版: (2016) -
On the security of auditing mechanisms for secure cloud storage
由: YU, Yong, et al.
出版: (2014)