Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an ident...
Saved in:
| Main Authors: | Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2015-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
by: Saddam Hussain, et al.
Published: (2025-01-01) -
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01) -
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01) -
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2014-04-01) -
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
by: Lei HE, et al.
Published: (2021-11-01)