[1] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007: 598-607.
|
[2] |
JUELS A , KALISKI B S J . PoRs:proofs of retrievability for large files[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007: 584-597.
|
[3] |
SHACHAM H , WATERS B . Compact proofs of retrievability[J]. Journal of Cryptology, 2013,26: 442-483.
|
[4] |
WANG H Q , WANG Q H , HE D B . Blockchain-based private provable data possession[J]. IEEE Transactions on Dependable and Secure Computing, 2019,PP(99): 1.
|
[5] |
LI Y N , YU Y , CHEN R N ,et al. IntegrityChain:provable data possession for decentralized storage[J]. IEEE Journal on Selected Areas in Communications, 2020,38(36): 1205-1217.
|
[6] |
CHEN R N , LI Y N , YU Y ,et al. Blockchain-based dynamic provable data possession for smart cities[J]. IEEE Internet of Things Journal, 2020,7(35): 4143-4154.
|
[7] |
NI J B , ZHANG K , YU Y ,et al. Identity-based provable data possession from RSA assumption for secure cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2020,PP(99): 1.
|
[8] |
WANG H Q , WU Q H , QIN B ,et al. Identity-based remote data possession checking in public clouds[J]. IET Information Security, 2014,8(32): 114-121.
|
[9] |
GUO W , ZHANG H , QIN S J ,et al. Outsourced dynamic provable data possession with batch update for secure cloud storage[J]. Future Generation Computer Systems, 2019,95: 309-322.
|
[10] |
ZHOU L , FU A M , YANG G M ,et al. Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2020,PP(99): 1.
|
[11] |
WANG H Q , HE D B , FU A M ,et al. Provable data possession with outsourced data transfer[J]. IEEE Transactions on Services Computing, 2019,PP(99): 1.
|
[12] |
WANG H Q , HE D B , YU J ,et al. Incentive and unconditionally anonymous identity-based public provable data possession[J]. IEEE Transactions on Services Computing, 2019,12(35): 824-835.
|
[13] |
裴定一, 祝跃飞 . 算法数论[M].第2版. 北京: 科学出版社, 2015.
|
|
PEI D Y , ZHU Y F . Algorithmic number theory.second edition[M]. Beijing: Science Press, 2015.
|
[14] |
YU Y , XUE L , AU M H ,et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA[J]. Future Generation Computer Systems, 2016,62: 85-91.
|
[15] |
ZHANG J H , LI P Y , SUN Z ,et al. ID-based data integrity auditing scheme from RSA with resisting key exposure[C]// Provable Security. Berlin:Springer, 2016: 83-100.
|