Research Article

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

Figure 5

The proof verification time with different number of challenged blocks.