Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure

    As an important method, cloud-based data auditing can realize the integrity checking of the outsourced data efficiently. However, the existing public auditing schemes are mainly based on the PKI (public key in...

    Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao in Provable Security (2016)