Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539605326725120 |
---|---|
author | Hao-xing LI Feng-hua LI Cheng-gen SONG Ya-long YAN |
author_facet | Hao-xing LI Feng-hua LI Cheng-gen SONG Ya-long YAN |
author_sort | Hao-xing LI |
collection | DOAJ |
description | To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption. |
format | Article |
id | doaj-art-ba7fd8c7cb124d5ba832b9dabf4714db |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ba7fd8c7cb124d5ba832b9dabf4714db2025-01-14T06:56:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-013711712759704066Provable data possession scheme with authenticationHao-xing LIFeng-hua LICheng-gen SONGYa-long YANTo satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/authenticationdata possessioncloud computingprovable securityrandom oracle |
spellingShingle | Hao-xing LI Feng-hua LI Cheng-gen SONG Ya-long YAN Provable data possession scheme with authentication Tongxin xuebao authentication data possession cloud computing provable security random oracle |
title | Provable data possession scheme with authentication |
title_full | Provable data possession scheme with authentication |
title_fullStr | Provable data possession scheme with authentication |
title_full_unstemmed | Provable data possession scheme with authentication |
title_short | Provable data possession scheme with authentication |
title_sort | provable data possession scheme with authentication |
topic | authentication data possession cloud computing provable security random oracle |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/ |
work_keys_str_mv | AT haoxingli provabledatapossessionschemewithauthentication AT fenghuali provabledatapossessionschemewithauthentication AT chenggensong provabledatapossessionschemewithauthentication AT yalongyan provabledatapossessionschemewithauthentication |