Research Article
Audit as You Go: A Smart Contract-Based Outsourced Data Integrity Auditing Scheme for Multiauditor Scenarios with One Person, One Vote
| Notation | Meaning |
| | A security parameter | and | Two cyclic multiplicative groups | | The generator of | | A bilinear map | and | Two different hash functions | | A pseudorandom function | | A pseudorandom permutation | | A random value | | The secret key | | The public key calculated as | | A specific file to be outsourced | | An identity assigned to the above file | | One of the blocks constituting the file | | One of the authenticators corresponding to | | The set of | | The file tag of | | The number of challenged blocks | and | Two random numbers generated by each auditor, respectively | and | Two numbers aggregated by and , respectively, constituting the integrity challenge | and | Two data calculated by the challenge and the stored file, constituting the integrity proof |
|
|