Research Article
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
Table 4
Notation of cryptographic operations.
| Operations | Description |
| | t map-to- operations | | t map-to-G operations | | t multiplication in group G | | t multiplication in group | | t exponentiations in group G | | t bilinear mappings among elements of G | | t additions on group G | | t additions on group | | t c-term exponentiations in group G, |
|
|