{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:18:10Z","timestamp":1752671890675,"version":"3.37.3"},"reference-count":52,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T00:00:00Z","timestamp":1639008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572132","U1705264","61272040"],"award-info":[{"award-number":["61572132","U1705264","61272040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Foundation of Hangzhou Normal University","award":["2017QDL002"],"award-info":[{"award-number":["2017QDL002"]}]},{"name":"Scientific Research Fund of Zhejiang Provincial Education Department","award":["Y201737292"],"award-info":[{"award-number":["Y201737292"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,30]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Provable Data Possession (PDP) is of crucial importance in public cloud storage since it allows users to check the integrity of their outsourced data without downloading it. However, the existing PDP schemes, which are based on classical number-theoretic assumptions, are insecure under quantum attacks. In this paper, we propose the first PDP scheme from standard lattices, using a specific leveled fully homomorphic signature (FHS) scheme. To remove the complex key management of PDP cryptosystem on the public key infrastructure (PKI) setting, we employ a specific leveled identity-based (ID-based) FHS scheme to construct the first ID-based PDP scheme from standard lattices. Our two PDP schemes are secure under the standard small integer solution (SIS) assumption, which is conjectured to withstand quantum attacks. Furthermore, we conduct experimental evaluations to validate the feasibility of the proposed PDP schemes in practice.<\/jats:p>","DOI":"10.1093\/comjnl\/bxab190","type":"journal-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T12:16:44Z","timestamp":1636546604000},"page":"3223-3239","source":"Crossref","is-referenced-by-count":3,"title":["Provable Data Possession Schemes from Standard Lattices for Cloud Computing"],"prefix":"10.1093","volume":"65","author":[{"given":"Fucai","family":"Luo","sequence":"first","affiliation":[{"name":"College of Science and Engineering , Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Saif","family":"Al-Kuwari","sequence":"additional","affiliation":[{"name":"College of Science and Engineering , Hamad Bin Khalifa University, Doha, Qatar"},{"name":"Kindi Computing Research Center , Qatar University, Doha, Qatar"}]},{"given":"Changlu","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Mathematic and Informatics , Fujian Normal University, Fuzhou, China"}]},{"given":"Fuqun","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Mathematics , Hangzhou Normal University, Hangzhou, China"},{"name":"Westone Cryptologic Research Center , Beijing, China"}]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Mathematics , Hangzhou Normal University, Hangzhou, China"},{"name":"Westone Cryptologic Research Center , Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2021,12,9]]},"reference":[{"key":"2023010312515991400_ref1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jnca.2018.03.017","article-title":"A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends","volume":"110","author":"Tan","year":"2018","journal-title":"J. Network and Computer Applications"},{"issue":"5","key":"2023010312515991400_ref2","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","article-title":"Enabling public auditability and data dynamics for storage security in cloud computing","volume":"22","author":"Wang","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2023010312515991400_ref3","first-page":"213","volume-title":"Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009","author":"Christopher Erway","year":"2009"},{"issue":"4","key":"2023010312515991400_ref4","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","article-title":"Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage","volume":"12","author":"Yu","year":"2017","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"2023010312515991400_ref5","first-page":"598","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007","author":"Ateniese","year":"2007"},{"key":"2023010312515991400_ref6","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.compeleceng.2017.09.025","article-title":"Identity-based non-repudiable dynamic provable data possession in cloud storage","volume":"69","author":"Wang","year":"2018","journal-title":"Computers & Electrical Engineering"},{"issue":"4","key":"2023010312515991400_ref7","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/2699909","article-title":"Dynamic provable data possession","volume":"17","author":"Erway","year":"2015","journal-title":"ACM Trans. Inf. Syst. Secur"},{"key":"2023010312515991400_ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2015.12.043","article-title":"Efficient id-based public auditing for the outsourced data in cloud storage","volume":"343-344","author":"Zhang","year":"2016","journal-title":"Inf. Sci."},{"issue":"4","key":"2023010312515991400_ref9","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/TIFS.2016.2646913","article-title":"Identity-based data outsourcing with comprehensive auditing in clouds","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"3","key":"2023010312515991400_ref10","first-page":"575","article-title":"Provable multiple-replica dynamic data possession for big data storage in cloud computing","volume":"20","author":"Hou","year":"2018","journal-title":"I. J. Network Security"},{"issue":"3","key":"2023010312515991400_ref11","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TIFS.2014.2384391","article-title":"Provable multicopy dynamic data possession in cloud computing systems","volume":"10","author":"Barsoum","year":"2015","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"2023010312515991400_ref12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comnet.2017.08.019","article-title":"A general framework to design secure cloud storage protocol using homomorphic encryption scheme","volume":"129","author":"Zhang","year":"2017","journal-title":"Computer Networks"},{"issue":"12","key":"2023010312515991400_ref13","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","article-title":"Cooperative provable data possession for integrity verification in multicloud storage","volume":"23","author":"Zhu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"2023010312515991400_ref14","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","article-title":"Panda: Public auditing for shared data with efficient user revocation in the cloud","volume":"8","author":"Wang","year":"2015","journal-title":"IEEE Trans. Services Computing"},{"issue":"12","key":"2023010312515991400_ref15","doi-asserted-by":"crossref","first-page":"2709","DOI":"10.1587\/transfun.E96.A.2709","article-title":"Identity-based public verification with privacy-preserving for data storage security in cloud computing","volume":"96-A","author":"Zhao","year":"2013","journal-title":"IEICE Transactions"},{"issue":"2","key":"2023010312515991400_ref16","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","article-title":"Identity-based remote data possession checking in public clouds","volume":"8","author":"Wang","year":"2014","journal-title":"IET Information Security"},{"key":"2023010312515991400_ref17","first-page":"326","volume-title":"Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7\u201311, 2014. Proceedings, Part I","author":"Wang","year":"2014"},{"issue":"5","key":"2023010312515991400_ref18","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2017.2656461","article-title":"Online\/offline provable data possession","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"3","key":"2023010312515991400_ref19","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/JCS-150525","article-title":"PCPOR: public and constant-cost proofs of retrievability in cloud","volume":"23","author":"Yuan","year":"2015","journal-title":"Journal of Computer Security"},{"issue":"3","key":"2023010312515991400_ref20","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","article-title":"Compact proofs of retrievability","volume":"26","author":"Shacham","year":"2013","journal-title":"J. Cryptology"},{"key":"2023010312515991400_ref21","first-page":"301","volume-title":"Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1\u20133, 2015, Revised Selected Papers","author":"Lin","year":"2015"},{"key":"2023010312515991400_ref22","first-page":"584","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007","author":"Juels","year":"2007"},{"key":"2023010312515991400_ref23","first-page":"90","volume-title":"Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7\u201311, 2008. Proceedings","author":"Shacham","year":"2008"},{"key":"2023010312515991400_ref24","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Boneh","year":"2001"},{"issue":"4","key":"2023010312515991400_ref25","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1093\/comjnl\/bxt137","article-title":"On indistinguishability in remote data integrity checking","volume":"58","author":"Fan","year":"2015","journal-title":"Comput. J."},{"issue":"1","key":"2023010312515991400_ref26","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs.2013.0322","article-title":"Proof of retrievability with public verifiability resilient against related-key attacks","volume":"9","author":"Cui","year":"2015","journal-title":"IET Information Security"},{"issue":"1","key":"2023010312515991400_ref27","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/s00145-015-9216-2","article-title":"Dynamic proofs of retrievability via oblivious RAM","volume":"30","author":"Cash","year":"2017","journal-title":"J. Cryptology"},{"key":"2023010312515991400_ref28","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.jnca.2017.12.007","article-title":"DIPOR: an ida-based dynamic proof of retrievability scheme for cloud storage systems","volume":"104","author":"Anmin","year":"2018","journal-title":"J. Network and Computer Applications"},{"issue":"4","key":"2023010312515991400_ref29","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TSC.2015.2481880","article-title":"Dynamic proofs of retrievability for coded cloud storage systems","volume":"11","author":"Ren","year":"2018","journal-title":"IEEE Trans. Services Computing"},{"key":"2023010312515991400_ref30","first-page":"68","volume-title":"Public Key Cryptography","author":"Boneh","year":"2009"},{"key":"2023010312515991400_ref31","doi-asserted-by":"crossref","first-page":"9641273:1","DOI":"10.1155\/2018\/9641273","article-title":"A homomorphic network coding signature scheme for multiple sources and its application in iot","volume":"2018","author":"Li","year":"2018","journal-title":"Security and Communication Networks"},{"key":"2023010312515991400_ref32","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ins.2018.12.025","article-title":"A more efficient leveled strongly-unforgeable fully homomorphic signature scheme","volume":"480","author":"Luo","year":"2019","journal-title":"Inf. Sci."},{"key":"2023010312515991400_ref33","first-page":"244","volume-title":"Topics in Cryptology - CT-RSA 2002, The Cryptographer\u2019s Track at the RSA Conference, 2002, San Jose, CA, USA, February 18\u201322, 2002, Proceedings","author":"Johnson","year":"2002"},{"key":"2023010312515991400_ref34","first-page":"697","volume-title":"Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21\u201323, 2012. Proceedings","author":"Freeman","year":"2012"},{"issue":"9","key":"2023010312515991400_ref35","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1109\/TC.2010.73","article-title":"On homomorphic signatures for network coding","volume":"59","author":"Yun","year":"2010","journal-title":"IEEE Trans. Computers"},{"key":"2023010312515991400_ref36","first-page":"371","volume-title":"Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I","author":"Catalano","year":"2014"},{"key":"2023010312515991400_ref37","first-page":"149","volume-title":"Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15\u201319, 2011. Proceedings","author":"Boneh","year":"2011"},{"key":"2023010312515991400_ref38","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1145\/2746539.2746576","volume-title":"Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015","author":"Gorbunov","year":"2015"},{"key":"2023010312515991400_ref39","first-page":"297","volume-title":"Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I","author":"Alperin-Sheriff","year":"2014"},{"key":"2023010312515991400_ref40","first-page":"533","volume-title":"Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11\u201315, 2014. Proceedings","author":"Boneh","year":"2014"},{"key":"2023010312515991400_ref41","first-page":"42","volume-title":"Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9\u201311, 2015, Proceedings","author":"Wang","year":"2015"},{"key":"2023010312515991400_ref42","first-page":"499","volume-title":"Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4\u20138, 2016, Proceedings, Part II","author":"Fiore","year":"2016"},{"key":"2023010312515991400_ref43","first-page":"455","article-title":"Vector encoding over lattices and its applications","volume":"2017","author":"Apon","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"5","key":"2023010312515991400_ref44","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"2023010312515991400_ref45","first-page":"99","article-title":"Generating hard instances of lattice problems (extended abstract)","volume-title":"Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22\u201324, 1996","author":"Ajtai","year":"1996"},{"issue":"5","key":"2023010312515991400_ref46","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1002\/sec.691","article-title":"A post-quantum provable data possession protocol in cloud","volume":"6","author":"Chen","year":"2013","journal-title":"Security and Communication Networks"},{"key":"2023010312515991400_ref47","first-page":"144","volume-title":"Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10\u201314, 2006, Proceedings, Part II","author":"Lyubashevsky","year":"2006"},{"key":"2023010312515991400_ref48","first-page":"700","volume-title":"Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15\u201319, 2012. Proceedings","author":"Micciancio","year":"2012"},{"key":"2023010312515991400_ref49","first-page":"372","volume-title":"45th Symposium on Foundations of Computer Science (FOCS 2004), 17\u201319 October 2004, Rome, Italy, Proceedings","author":"Micciancio","year":"2004"},{"key":"2023010312515991400_ref50","first-page":"48","volume-title":"Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14\u201316, 2013, Revised Selected Papers","author":"El Bansarkhani","year":"2013"},{"key":"2023010312515991400_ref51","first-page":"197","volume-title":"Trapdoors for hard lattices and new cryptographic constructions","author":"Gentry","year":"2008"},{"key":"2023010312515991400_ref52","first-page":"553","volume-title":"Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings","author":"Agrawal","year":"2010"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/12\/3223\/48480711\/bxab190.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/12\/3223\/48480711\/bxab190.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T12:53:31Z","timestamp":1672750411000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/65\/12\/3223\/6457160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,9]]},"references-count":52,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12,9]]},"published-print":{"date-parts":[[2022,12,30]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxab190","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2022,12]]},"published":{"date-parts":[[2021,12,9]]}}}