Research Article
Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
| Notations | Descriptions |
| | The elliptic curve | | The finite field | | The cyclic group | | Generator of | | Secure hash function | | Public key of the system | | DO’s real identity | | DO’s virtual identity | , , , , | Random numbers | | DO’s secret key | | DO’s public key | | The identifier of the data block | | The data block | , , | Intermediate parameters | , | The tags of | | The collection of challenged indexes | | The proof | | The computational cost of one hash | | The computational cost of one addition on | | The computational cost of one multiplication on | | The computational cost of one point addition on | | The computational cost of one point multiplication on |
|
|