Research Article
Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
Table 1
Comparison of computational cost.
| Schemes | Tag generation | Proof generation | Proof audition | User privacy preserving |
| [31] | | | | No | [36] | | | | No | [37] | | | | No | Our scheme | | | | Yes |
|
|