SCIENCE CHINA Information Sciences, Volume 62 , Issue 5 : 059101(2019) https://doi.org/10.1007/s11432-018-9500-0

An efficient $i{\cal~O}$-based data integrity verification scheme for cloud storage

More info
  • ReceivedApr 12, 2018
  • AcceptedJun 20, 2018
  • PublishedOct 12, 2018


There is no abstract available for this article.


This work was supported by National Key RD Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203).


Appendixes A and B.


[1] Li H W, Liu D X, Dai Y S. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput, 2015, 3: 127-138 CrossRef Google Scholar

[2] Zhang Y, Xu C X, Yu S. SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Soc Syst, 2015, 2: 159-170 CrossRef Google Scholar

[3] Li H W, Yang Y, Dai Y S, et al. Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput, 2017. doi: 10.1109/TCC.2017.2769645. Google Scholar

[4] Sun L X, Xu C X, Zhang Y. A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting. J Inf Security Appl, 2018, 40: 145-155 CrossRef Google Scholar

[5] Garg S, Gentry C, Halevi S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of the 54th Annual Symposium on Foundations of Computer Science, Berkeley, 2013. 40--49. Google Scholar

[6] Zhang Y, Xu C X, Liang X H. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans In Forensic Secur, 2017, 12: 676-688 CrossRef Google Scholar

[7] Sun L X, Xu C X, Zhang M W. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61: 038106 CrossRef Google Scholar

[8] Guan C W, Ren K, Zhang F G, et al. Symmetric-key based proofs of retrievability supporting public verification. In: Proceedings of European Symposium on Research in Computer Security, Vienna, 2015. 203--223. Google Scholar

[9] Shi E, Stefanov E, Papamanthou C. Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Berlin, 2013. 325--336. Google Scholar

  • Figure 1

    Audit circuit ${\rm~Audit}_{K,{\rm~ssk}}$.