Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhang, Xiaojun, Wang, Huaxiong, Xu, Chunxiang
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/151363
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English