Provable data possession scheme with authentication

To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three in...

Full description

Saved in:
Bibliographic Details
Main Authors: Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539605326725120
author Hao-xing LI
Feng-hua LI
Cheng-gen SONG
Ya-long YAN
author_facet Hao-xing LI
Feng-hua LI
Cheng-gen SONG
Ya-long YAN
author_sort Hao-xing LI
collection DOAJ
description To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.
format Article
id doaj-art-ba7fd8c7cb124d5ba832b9dabf4714db
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ba7fd8c7cb124d5ba832b9dabf4714db2025-01-14T06:56:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-013711712759704066Provable data possession scheme with authenticationHao-xing LIFeng-hua LICheng-gen SONGYa-long YANTo satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/authenticationdata possessioncloud computingprovable securityrandom oracle
spellingShingle Hao-xing LI
Feng-hua LI
Cheng-gen SONG
Ya-long YAN
Provable data possession scheme with authentication
Tongxin xuebao
authentication
data possession
cloud computing
provable security
random oracle
title Provable data possession scheme with authentication
title_full Provable data possession scheme with authentication
title_fullStr Provable data possession scheme with authentication
title_full_unstemmed Provable data possession scheme with authentication
title_short Provable data possession scheme with authentication
title_sort provable data possession scheme with authentication
topic authentication
data possession
cloud computing
provable security
random oracle
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016203/
work_keys_str_mv AT haoxingli provabledatapossessionschemewithauthentication
AT fenghuali provabledatapossessionschemewithauthentication
AT chenggensong provabledatapossessionschemewithauthentication
AT yalongyan provabledatapossessionschemewithauthentication