Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

With the rapid development of cloud auditing services, key exposure has been highlighted as a serious security issue. Using the exposed private key of a client, cloud servers can forge previous auditing proofs to cheat auditors. To date, a few pairing-based cloud storage auditing schemes addressing...

全面介紹

Saved in:
書目詳細資料
Main Authors: Zhang, Xiaojun, Wang, Huaxiong, Xu, Chunxiang
其他作者: School of Physical and Mathematical Sciences
格式: Article
語言:English
出版: 2021
主題:
在線閱讀:https://hdl.handle.net/10356/151363
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!