Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | , , , |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2016-10-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/ |
