{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:38:35Z","timestamp":1740116315694,"version":"3.37.3"},"reference-count":19,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272420"],"award-info":[{"award-number":["61272420"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502234"],"award-info":[{"award-number":["61502234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20150785"],"award-info":[{"award-number":["BK20150785"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p> By advances in cloud storage systems, users have access to the data saved in the cloud and can manipulate the data without limitation of time and place. As the data owner no longer possesses data physically, he is required to ensure the integrity of the data stored in the cloud with the public key given by public key infrastructure (PKI). Thus the security of PKI and certificates are essential. However, there are numerous security risks in the traditional PKI and it is complex to administer the certificates. Certificateless public key cryptography is used in this paper to solve these problems. We also use elliptic curve group to reduce computation overhead. In this paper, we design a certificateless public verification mechanism to check the integrity of data outsourced in the cloud and we further extend it to support a multiuser group by batch verification. Specifically, a public verifier who replaces the data owner to check the integrity in the proposed scheme does not require to manage any certificates during the verification process. Meanwhile, a verifier is not required to download the entire file for integrity checking. Theoretical analyses verify the security of our scheme and experimental results show its efficiency. <\/jats:p>","DOI":"10.1142\/s0218126618501815","type":"journal-article","created":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T22:24:21Z","timestamp":1518647061000},"page":"1850181","source":"Crossref","is-referenced-by-count":8,"title":["Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage"],"prefix":"10.1142","volume":"27","author":[{"given":"Longxia","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7734-4077","authenticated-orcid":false,"given":"Junlong","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]},{"given":"Jin","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]},{"given":"Ahmadreza","family":"Vajdi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2018,6,6]]},"reference":[{"key":"S0218126618501815BIB001","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126615501182"},{"key":"S0218126618501815BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"S0218126618501815BIB003","first-page":"5232846","volume":"2016","author":"Ren W.","year":"2016","journal-title":"Mobile Inf. Syst."},{"key":"S0218126618501815BIB004","first-page":"2353","volume":"52","author":"Fu A.","year":"2015","journal-title":"J. Comput. Res. Dev."},{"key":"S0218126618501815BIB005","first-page":"1","author":"Xie G.","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"S0218126618501815BIB007","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"S0218126618501815BIB009","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417500547"},{"key":"S0218126618501815BIB010","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843012410018"},{"key":"S0218126618501815BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2299807"},{"key":"S0218126618501815BIB012","first-page":"2334","volume":"53","author":"Huang L.","year":"2016","journal-title":"J. Comput. Res. Dev."},{"key":"S0218126618501815BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"S0218126618501815BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0263-8"},{"key":"S0218126618501815BIB017","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126617500724"},{"key":"S0218126618501815BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.003"},{"key":"S0218126618501815BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.1"},{"key":"S0218126618501815BIB021","first-page":"1","volume":"334","author":"Zhang J.","year":"2016","journal-title":"Inf. Sci."},{"key":"S0218126618501815BIB022","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126699000189"},{"key":"S0218126618501815BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"S0218126618501815BIB025","first-page":"1","author":"He D.","year":"2015","journal-title":"IEEE Syst. J."}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126618501815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T11:37:35Z","timestamp":1569065855000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126618501815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,6]]},"references-count":19,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,6,6]]},"published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.1142\/S0218126618501815"],"URL":"https:\/\/doi.org\/10.1142\/s0218126618501815","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2018,6,6]]}}}