[1] |
DESWARTE Y , QUISQUATER J , SAIDANE A . Remote integrity checking[M]// Integrity and Internal Control in Information Systems VI. 2004: 1-11.
|
[2] |
OPREA A , REITER M K , YANG K . Space-efficient block storage integrity[C]// Internet Society,Network and Distributed System Security Symposium. 2005: 1-12.
|
[3] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// ACM Conference on Computer and Communications Security. 2007: 598-609.
|
[4] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Remote data checking using Provable data possession[J]. ACM Transactions on Information & System Security(TISSEC), 2011,14(1): 1-34.
|
[5] |
JUELS A , . Pors:proofs of retrievability for large files[C]// ACM Conference on Computer and Communications Security. 2007: 584-597.
|
[6] |
SHACHAM H , WATERS B . Compact proofs of retrievability[C]// Asiacrypt LNCS 5350. 2008: 90-107.
|
[7] |
SHACHAM H , WATERS B . Compact proofs of retrievability[J]. Journal of Cryptology, 2013,26(3): 442-483.
|
[8] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Crypto. 1984: 47-53.
|
[9] |
BONEH D , FRANKLIN M K . Identity based encryption from the weil pairing[J]. Siam Journal on Computing, 2001,32(3): 213-229.
|
[10] |
ZHANG J , DONG Q . Efficient ID-based public auditing for the outsourced data in cloud storage[J]. Information Sciences, 2016,343-344(C): 1-14.
|
[11] |
YU Y , XUE L , MAN H A ,et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA[J]. Future Generation Computer Systems, 2016,62(C): 85-91.
|
[12] |
ZHANG J , LI P , SUN Z ,et al. ID-based data integrity auditing scheme from RSA with resisting key exposure[C]// International Conference on Provable Security. 2016: 83-100.
|
[13] |
XU Z , WU L , KHAN M K ,et al. A secure and efficient public auditing scheme using RSA algorithm for cloud storage[J]. Journal of Supercomputing, 2017(4): 1-25.
|