Research Article
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
Table 1
Important notations and their meanings.
| Sl. no | Notation | Meaning |
| 1. | | Multiplicative cyclic groups of order | 2. | | Generator of the cyclic group | 3. | | The bilinear map | 4. | | Points in the group in which are public, and is kept secret by the system manager | 5. | | A random element from kept as a secret by the system manager | 6. | | Identity of the mobile user | 7. | | Public key of the mobile user | 8. | | Mobile user | 9. | | A random element from kept as a secret by mobile user | 10. | | Asymmetric encryption function with the key | 11. | | block of file | 12. | | Tag of the block of file |
|
|