Advances, Systems and Applications
From: CRUPA: collusion resistant user revocable public auditing of shared data in cloud
Notation | Description |
---|---|
\(\mathbb {G}_{1}\), \(\mathbb {G}_{2}\) | Multiplicative groups of prime order p |
g | Generator polynomial of \(\mathbb {G}_{1}\) |
H(·) | Secure map-to-point hash function |
h(·) | hash function maps cluster element of \(\mathbb {G}_{1}\) consistently to Zp |
tagF | Tag of file F |
Pk | Public key |
Sk | Secret key |
τ1 | Signature on block b1 |
n | Total number of chunks in shared data |
S | Shared information |
c | Total number of customers in a cluster |
d1,i | Information proprietor of 1st cluster |
CL | Customer List |
bk | kth block |
idk | kth block identifier |
E | Subset of q random blocks |
τRe−key | Re-sign key |
ρk\(\phantom {\dot {i}\!}{}^{(\tau _{Re-key})}\) | Re-Signature on revoked customer’s kth block |
Public parameters | (vd, wd, gd, Jd) |
\(F_{d_{1},i}\) | File owned by information proprietor (d1) of ith cluster |
ϕ | Set of signatures on entire chunks in distributed information. |
Exp\(\mathbb {G}_{1}\) | One exponentiation in \(\mathbb {G}_{1}\) |
Mul\(\mathbb {G}_{1}\) | One multiplication in \(\mathbb {G}_{1}\) |
Pair | Pairing operation on e: \(\mathbb {G}_{1}\) * \(\mathbb {G}_{2}\) →\(\mathbb {G}_{\mathrm {T}}\) |
\({m}-{MulExp}^{t}_{\mathbb {G}}\) | t m term exponentiations \(\phantom {\dot {i}\!}\sum _{i=1}^{m} g^{a_{i}}\) |