Research Article

Audit as You Go: A Smart Contract-Based Outsourced Data Integrity Auditing Scheme for Multiauditor Scenarios with One Person, One Vote

Table 1

Notations.

NotationMeaning

A security parameter
and Two cyclic multiplicative groups
The generator of
A bilinear map
and Two different hash functions
A pseudorandom function
A pseudorandom permutation
A random value
The secret key
The public key calculated as
A specific file to be outsourced
An identity assigned to the above file
One of the blocks constituting the file
One of the authenticators corresponding to
The set of
The file tag of
The number of challenged blocks
and Two random numbers generated by each auditor, respectively
and Two numbers aggregated by and , respectively, constituting the integrity challenge
and Two data calculated by the challenge and the stored file, constituting the integrity proof