Provable data possession scheme with authentication

To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...

Full description

Bibliographic Details
Published in:Tongxin xuebao
Main Authors: Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Format: Article
Language:Chinese
Published: Editorial Department of Journal on Communications 2016-10-01
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/