[1] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable Data Possession at Untrusted Stores[C]// Acm Conference on Computer & Communications Security. New York: ACM, 2007:598-609.
|
[2] |
WANG C, CHOW S, WANG Q, et al. Privacy-Preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Computers, 2013, 62(2):362-375.
doi: 10.1109/TC.2011.245
|
[3] |
任静思, 王劲林, 陈晓, 等. 一种多副本动态数据持有性证明方案[J]. 西安电子科技大学学报, 2017, 44(6):156-161.
|
|
REN Jingsi, WANG Jinlin, CHEN Xiao, et al. Provable Multi-copy Dynamic Data Possession in Cloud Storage[J]. Journal of Xidian University, 2017, 44(6):156-161.
|
[4] |
ERWAY C C, KUPCU A, PAPAMANTHOU C, et al. Dynamic Provable Data Possession[J]. ACM Transaction on Information and System Security, 2015, 17(4):1-29.
|
[5] |
WANG Q, WANG C, REN K, et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5):847-859.
doi: 10.1109/TPDS.2010.183
|
[6] |
JIN H, JIANG H, ZHOU K. Dynamic and Public Auditing with Fair Arbitration for Cloud Data[J]. IEEE Transactions on Cloud Computing, 2016, 6(3):680-693.
doi: 10.1109/TCC.2016.2525998
|
[7] |
TIAN H, CHEN Y X, CHANG C C, et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Services Computing, 2017, 10(5):701-714.
doi: 10.1109/TSC.2015.2512589
|
[8] |
SHEN J, SHEN J, Chen X F, et al. An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10):2402-2415.
doi: 10.1109/TIFS.2017.2705620
|
[9] |
GUO W, ZHANG H, QIN S J, et al. Outsourced Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage[J]. Future Generation Computer Systems, 2019, 95:309-322.
doi: 10.1016/j.future.2019.01.009
|
[10] |
HOU G P, MA J F, LIANG C, et al. Efficient Audit Protocol Supporting Virtual Nodes in Cloud Storage[J]. Transactions on Emerging Telecommunications Technologies, 2020, 32(5):1-14.
|
[11] |
KASYOKA P, KIMWELE M, ANGOLO S M. Cryptanalysis of a Pairing-Free Certificateless Signcryption Scheme[J]. ICT Express, 2020, 7(2):200-204.
doi: 10.1016/j.icte.2020.07.006
|
[12] |
赵洋, 任化强, 熊虎, 等. 无双线性对的云数据完整性验证方案[J]. 信息网络安全, 2015, 15(7):7-12.
|
|
ZHAO Yang, REN Huaqiang, XIONG Hu, et al. Cloud Data Integrity Verification Scheme without Bilinear Pairing[J]. Netinfo Security, 2015, 15(7):7-12.
|
[13] |
孙长洪. 基于无双线性对的云端数据完整性审计方案研究[D]. 武汉: 华中科技大学, 2018:1-88.
|
[14] |
WANG C, CHOW S S M, WANG Q, et al. Privacy-Preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Computers, 2013, 62(2):362-375.
doi: 10.1109/TC.2011.245
|
[15] |
翟社平, 汪一景, 陈思吉. 区块链技术在电子病历共享的应用研究[J]. 西安电子科技大学学报, 2020, 47(5):103-112.
|
|
ZHAI Sheping, WANG Yijing, CHEN Siji. Research on the Application of Blockchain Technology in the Sharing of Electronic Medical Records[J]. Journal of Xidian University, 2020, 47(5):103-112.
|
[16] |
MAXWELL G, POELSTRA A, SEURIN Y, et al. Simple Schnorr Multi-Signatures with Applications to Bitcoin[J]. Designs,Codes and Cryptography, 2019, 87(9):2139-2164.
doi: 10.1007/s10623-019-00608-x
|