Certificateless public auditing protocol with constant verification time

Dongmin Kim, Ik Rae Jeong

Research output: Contribution to journalArticlepeer-review

16 Citations (Scopus)


To provide the integrity of outsourced data in the cloud storage services,many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal securitymodels and prove the security of our scheme under the three security models.

Original languageEnglish
Article number6758618
JournalSecurity and Communication Networks
Publication statusPublished - 2017

Bibliographical note

Funding Information:
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (NRF-2013R1A2A2A01068200).

Publisher Copyright:
© 2017 Dongmin Kim and Ik Rae Jeong.

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications


Dive into the research topics of 'Certificateless public auditing protocol with constant verification time'. Together they form a unique fingerprint.

Cite this