4.7 Article

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

期刊

INFORMATION SCIENCES
卷 375, 期 -, 页码 48-53

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2016.09.049

关键词

Public auditing; Identity-based cryptography; Provable security; Bilinear pairing

资金

  1. National Natural Science Foundation of China [61501333, 61572379, 61272522, U1536204]
  2. Natural Science Foundation of Hubei Province of China [2015CFB257]
  3. National High-Tech Research and Development Program of China (863 Program) [2015AA016004]

向作者/读者索取更多资源

Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据