Citation: | HUANG Longxia, ZHOU Junlong, ZHANG Gongxuan, et al., “Certificateless Public Verification for Data Storage and Sharing in the Cloud,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 639-647, 2020, doi: 10.1049/cje.2020.05.007 |
Y. Li, Y. Yu, G. Min, et al., “Fuzzy identity-based data integrity auditing for reliable cloud storage systems”, IEEE Transactions on Dependable and Secure Computing, Vol.16, No.1, pp.72-83, 2017.
|
B. Wang, B. Li and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud”, IEEE Transactions on Cloud Computing, Vol.2, No.1, pp.43-56, 2012.
|
L. Huang, J. Zhou, G. Zhang, et al., “Certificateless public verification for the outsourced data integrity in cloud storage”, Journal of Circuits, Systems and Computers, Vol.27, No.11, Article ID 1850181, 2018.
|
Q. Huang, Z. Ma, Y. Yang, et al., “Secure data sharing and retrieval using attribute-based encryption in cloudbased OSNs”, Chinese Journal of Electronics, Vol.23, No.3, pp.557-563, 2014.
|
G. Ateniese, R. C. Burns, R. Curtmola, et al., “Remote data checking using provable data possession”, ACM Transaction on Information and System Security, Vol.14, No.1, pp.12, 2011.
|
C. Wang, S. Chow, Q. Wang, et al., “Privacy-preserving public auditing for secure cloud storage”, IEEE Transactions on Computers, Vol.62, No.2, pp.362-375, 2011.
|
Y. Li, Y. Yu, B. Yang, et al., “Privacy preserving cloud data auditing with efficient key update”, Future Generation Computer Systems, Vol.78, pp.789-798, 2018.
|
B. Wang, B. Li and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud”, International Conference on Applied Cryptography and Network Security, Singapore, Singapore, pp.507-525, 2012.
|
L. Huang, G. Zhang and A. Fu, “Privacy-preserving public auditing for non-manager group shared data”, Wireless Personal Communications, Vol.100, No.4, pp.1277-1294, 2018.
|
C. Wang, Q. Wang, K. Ren, et al., “Privacy-preserving public auditing for data storage security in cloud computing”, IEEE INFOCOM, San Diego, CA, USA, pp.1-9, 2010.
|
J. Xie, Y. Hu, J. Gao, et al., “Certificateless sequential aggregate signature scheme on NTRU Lattice”, Chinese Journal of Electronics, Vol.28, No.2, pp.294-300, 2019.
|
J. Zhang and Q. Dong, “Efficient ID-based public auditing for the outsourced data in cloud storage”, Information Sciences, Vol.343, pp.1-14, 2016.
|
H. Wang, “Identity-based distributed provable data possession in multicloud storage”, IEEE Transactions on Services Computing, Vol.8, No.2, pp.328-340, 2015.
|
J. Zhang, P. Li and J. Mao, “IPad: ID-based public auditing for the outsourced data in the standard model”, Cluster Computing, Vol.19, No.1, pp.127-138, 2016.
|
D. He, N. Kumar, S. Zeadally, et al., “Certificateless provable data possession scheme for cloud-based smart grid data management systems”, IEEE Transactions on Industrial Informatics, Vol.14, No.3, pp.1232-1241, 2017.
|
D. He, S. Zeadally and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks”, IEEE Systems Journal, Vol.12, No.1, pp.64-73, 2015.
|
Z. Ren, L. Wang, Q. Wu, et al., “Data dynamics enabled privacypreserving public batch auditing in cloud storage”, Chinese Journal of Electronics, Vol.23, No.2, pp.297-301, 2014.
|
Y. Qi, X. Tang and Y. Huang, “Enabling efficient batch updating verification for multi-versioned data in cloud storage”, Chinese Journal of Electronics, Vol.28, No.2, pp.377-385, 2019.
|
X. Zou, B. Ramamurthy and S. Magliveras, “Chinese remainder theorem based hierarchical access control for secure group communication”, International Conference on Information and Communications Security, Xi'an, China, pp.381-385, 2001.
|
L. Huang, G. Zhang, S. Yu, et al., “Customized data sharing scheme based on blockchain and weighted attribute”, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, United Arab Emirates, pp.206-212, 2018.
|
J. Zhang, J. Cui, H. Zhong, et al., “PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks”, IEEE Transactions on Dependable and Secure Computing, 2019.
|
S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography”, International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, pp.452-473, 2003.
|
B. Lynn, “Pbc: The pairing-based cryptography library”, http://crypto.stanford.edu/pbc,2011.
|
L. Huang, G. Zhang, S. Yu, et al., “SeShare: Secure cloud data sharing based on blockchain and public auditing”, Concurrency and Computation: Practice and Experience, Vol.2017, Article ID e4359, 2017.
|