The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1016/j.jisa.2021.102776
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient group signature scheme based on multivariate public key cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…Kundu et al [41] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store all of the data in the cloud.…”
Section: Privacy-preserving Public Auditing For Shared Cloud Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Kundu et al [41] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store all of the data in the cloud.…”
Section: Privacy-preserving Public Auditing For Shared Cloud Datamentioning
confidence: 99%
“…• Pioneer in privacy-preserving schemes for cloud • Supports privacy-preserving public auditing PPPASCD [41] • The proxy re-signature scheme is used for outsourcing the updated operations • TPA consumes more time • Highly efficient for dynamic groups • The private key is shared between the group's shared data for computing signatures. and bandwidth to achieve…”
mentioning
confidence: 99%
“…5.1.5. Privacy-preserving public auditing for shared cloud data Kundu et al [72] also introduced an approach that can be performed by the TPA to audit the shared data integrity. Data can be audited with no need to store the whole data in the cloud.…”
Section: Secure and Efficient Privacy-preserving Public Auditing (Sepppa) Protocolmentioning
confidence: 99%
“…The proposed method's iterating frequency is finite; however, it presents an efficient solution and carries out a dynamic data operation [103]. • Pioneer in privacy-preserving schemes for cloud • Supports privacy-preserving public auditing PPPASCD [72] • The proxy re-signature scheme is used for outsourcing the updated operations • TPA consumes more time • Highly efficient for dynamic groups • The private key is shared between the group's shared data for computing signatures.…”
Section: Privacy Negotiation Language (Pnl) Based On Description Logicmentioning
confidence: 99%