• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Longxia, Zhang Gongxuan, Fu Anmin. Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree[J]. Journal of Computer Research and Development, 2016, 53(10): 2334-2342. DOI: 10.7544/issn1000-1239.2016.20160429
Citation: Huang Longxia, Zhang Gongxuan, Fu Anmin. Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree[J]. Journal of Computer Research and Development, 2016, 53(10): 2334-2342. DOI: 10.7544/issn1000-1239.2016.20160429

Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree

More Information
  • Published Date: September 30, 2016
  • As the rapid development of cloud storage, it is important to protect the security of shared data in cloud. Therefore, it is necessary to protect users’ privacy and verify the integrity of data efficiently during the data sharing. As the existing schemes consider little about the management and secure distribution of key, based on hierarchy tree and proxy re-signature, a privacy-preserving public auditing scheme which supports dynamic group in cloud storage is supposed. The proposed scheme firstly uses logical hierarchy key tree to establish and distribute keys, and a key server is utilized to store keys. The revocation of user is independent from users’ obtaining new group secret key as each user only stores the leaf node key. When a user revokes, the valid user can obtain the new group secret key with their original keys. Therefore, the scheme is more efficient for dynamic group. The security analysis and performance analysis show that the scheme is secure and efficient.
  • Related Articles

    [1]Qi Lei, Ren Zihao, Liu Junxi, Geng Xin. Person Re-identification Method Based on Hybrid Real-Synthetic Data[J]. Journal of Computer Research and Development, 2025, 62(2): 418-431. DOI: 10.7544/issn1000-1239.202330718
    [2]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [3]Peng Cong, Luo Min, He Debiao, Huang Xinyi. Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2278-2286. DOI: 10.7544/issn1000-1239.2021.20210645
    [4]Zeng Weixin, Zhao Xiang, Tang Jiuyang, Tan Zhen, Wang Wei. Iterative Entity Alignment via Re-Ranking[J]. Journal of Computer Research and Development, 2020, 57(7): 1460-1471. DOI: 10.7544/issn1000-1239.2020.20190643
    [5]Dai Chenchao, Wang Hongyuan, Ni Tongguang, Chen Shoubing. Person Re-Identification Based on Deep Convolutional Generative Adversarial Network and Expanded Neighbor Reranking[J]. Journal of Computer Research and Development, 2019, 56(8): 1632-1641. DOI: 10.7544/issn1000-1239.2019.20190195
    [6]Guo Lifeng and Lu Bo. Efficient Proxy Re-encryption with Keyword Search Scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
    [7]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [8]Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549.
    [9]Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.
    [10]Wu Zhongdong, Xie Weixin, Yu Jianping. A Security Enhancement Method of a Verifiable Threshold Signature Scheme Based on the Elliptic Curve[J]. Journal of Computer Research and Development, 2005, 42(4): 705-710.

Catalog

    Article views (1424) PDF downloads (622) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return