Skip to main content

Advances, Systems and Applications

Table 2 Summary of the Notations used in the Algorithm 2

From: CRUPA: collusion resistant user revocable public auditing of shared data in cloud

Notation

Description

\(\mathbb {G}_{1}\), \(\mathbb {G}_{2}\)

Multiplicative groups of prime order p

g

Generator polynomial of \(\mathbb {G}_{1}\)

H(·)

Secure map-to-point hash function

h(·)

hash function maps cluster element of \(\mathbb {G}_{1}\) consistently to Zp

tagF

Tag of file F

Pk

Public key

Sk

Secret key

τ1

Signature on block b1

n

Total number of chunks in shared data

S

Shared information

c

Total number of customers in a cluster

d1,i

Information proprietor of 1st cluster

CL

Customer List

bk

kth block

idk

kth block identifier

E

Subset of q random blocks

τRekey

Re-sign key

ρk\(\phantom {\dot {i}\!}{}^{(\tau _{Re-key})}\)

Re-Signature on revoked customer’s kth block

Public parameters

(vd, wd, gd, Jd)

\(F_{d_{1},i}\)

File owned by information proprietor (d1) of ith cluster

ϕ

Set of signatures on entire chunks in distributed information.

Exp\(\mathbb {G}_{1}\)

One exponentiation in \(\mathbb {G}_{1}\)

Mul\(\mathbb {G}_{1}\)

One multiplication in \(\mathbb {G}_{1}\)

Pair

Pairing operation on e: \(\mathbb {G}_{1}\) * \(\mathbb {G}_{2}\)\(\mathbb {G}_{\mathrm {T}}\)

\({m}-{MulExp}^{t}_{\mathbb {G}}\)

t m term exponentiations \(\phantom {\dot {i}\!}\sum _{i=1}^{m} g^{a_{i}}\)