期刊
INFORMATION SCIENCES
卷 375, 期 -, 页码 48-53出版社
ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2016.09.049
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing
资金
- National Natural Science Foundation of China [61501333, 61572379, 61272522, U1536204]
- Natural Science Foundation of Hubei Province of China [2015CFB257]
- National High-Tech Research and Development Program of China (863 Program) [2015AA016004]
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据