Research Article
Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud
Table 3
Comparison of communication overhead and security among three schemes.
| Scheme | Challenge information (bits) | Proof information (bits) | Total (bits) | Security |
| Zhang et al.’s scheme | | | | No | Our scheme | | | | Yes | Yu et al.’s scheme | | | | Yes |
|
|