Research Article

Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage

Table 1

Notations.

NotationsDescriptions

The elliptic curve
The finite field
The cyclic group
Generator of
Secure hash function
Public key of the system
DO’s real identity
DO’s virtual identity
, , , , Random numbers
DO’s secret key
DO’s public key
The identifier of the data block
The data block
, , Intermediate parameters
, The tags of
The collection of challenged indexes
The proof
The computational cost of one hash
The computational cost of one addition on
The computational cost of one multiplication on
The computational cost of one point addition on
The computational cost of one point multiplication on