1 |
AL-RUITHE M, BENKHELIFA E, JARARWEH Y, et al. Addressing data governance in cloud storage: survey, techniques and trends[J]. Journal of Internet Technology(網際網路技術學刊), 2018, 19(6): 1763-1776.
|
2 |
田俊峰,宋倩倩,王浩宁. 云存储环境下数据持有性证明研究综述[J]. 河北大学学报(自然科学版), 2021, 41(5):599-611.
|
|
TIAN J F, SONG Q Q, WANG H N. A review of proof of data possession in cloud storage environment[J]. Journal of Hebei University (Natural Science Edition), 2021, 41(5):599-611.
|
3 |
APIRAJITHA P S, SATHIANESAN G W. On developing Block-chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud[J]. Concurrency and Computation: Practice and Experience, 2024, 36(7): No.e7970.
|
4 |
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
|
5 |
ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York: ACM, 2008: No.9.
|
6 |
崔圆佑,王绪安,郎讯,等. 一种改进的短签名云数据审计方案[J]. 西安电子科技大学学报, 2023, 50(5):132-141.
|
|
CUI Y Y, WANG X A, LANG X, et al. Improved short-signature based cloud data audit scheme[J]. Journal of Xidian University, 2023, 50(5):132-141.
|
7 |
ZHANG Y, XU C, LIANG X, et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(3): 676-688.
|
8 |
HUANG L, ZHOU J, ZHANG G, et al. Certificateless public verification for the outsourced data integrity in cloud storage[J]. Journal of Circuits, Systems and Computers, 2018, 27(11): No.1850181.
|
9 |
KHEDR W I, KHATER H M, MOHAMED E R. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage[J]. IEEE Access, 2019, 7: 65635-65651.
|
10 |
张贺,王鹏,李思照. 基于格的后量子密码系统研究[J]. 无线电工程, 2022, 52(8):1310-1321.
|
|
ZHANG H, WANG P, LI S Z. Research on lattice-based post-quantum cryptosystem[J]. Radio Engineering, 2022, 52(8):1310-1321.
|
11 |
LI H, LIU L, LAN C, et al. Lattice-based privacy-preserving and forward-secure cloud storage public auditing scheme[J]. IEEE Access, 2020, 8: 86797-86809.
|
12 |
TIAN M, ZHANG Y, ZHU Y, et al. DIVRS: data integrity verification based on ring signature in cloud storage[J]. Computers and Security, 2023, 124: No.103002.
|
13 |
VARRI U S, PASUPULETI S K, KADAMBARI K V. CP-ABSEL: ciphertext-policy attribute-based searchable encryption from lattice in cloud storage[J]. Peer-to-Peer Networking and Applications, 2021, 14: 1290-1302.
|
14 |
GENTRY C. Certificate-based encryption and the certificate revocation problem[C]// Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer, 2003: 272-293.
|
15 |
WU L, XU Z, HE D, et al. New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment[J]. Security and Communication Networks, 2018, 2018: No.2595273.
|
16 |
AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 452-473.
|
17 |
SEPAHI R, STEINFELD R, PIEPRZYK J. Lattice-based certificateless public-key encryption in the standard model[J]. International Journal of Information Security, 2014, 13(4): 315-333.
|
18 |
XIE J, HU Y, GAO J, et al. Efficient certificateless signature scheme on NTRU lattice[J]. KSII Transactions on Internet and Information Systems, 2016, 10(10): 5190-5208.
|
19 |
DONG S, YAO Y, ZHOU Y, et al. A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system[J]. Peer-to-Peer Networking and Applications, 2024, 17: 284-296.
|
20 |
XU Z, HE D, VIJAYAKUMAR P, et al. Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs[J]. IEEE Journal of Biomedical and Health Informatics, 2023, 27(5): 2334-2344.
|
21 |
LI H, WANG Y, FU X, et al. PSCPAC: post-quantum secure certificateless public auditing scheme in cloud storage[J]. Journal of Information Security and Applications, 2021, 61: No.102927.
|
22 |
ALWEN J, PEIKERT C. Generating shorter bases for hard random lattices[J]. Theory of Computing Systems, 2011, 48(3): 535-553.
|
23 |
CENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206.
|
24 |
AGRAWAL S, BONEH D, BOVEN X. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE[C]// Proceedings of the 2010 Annual Cryptology Conference, LNCS 6223. Berlin: Springer, 2010: 98-115.
|