Skip to main content

Advances, Systems and Applications

Table 1 Symbols and their corresponding definitions

From: Identity-based remote data checking with a designated verifier

Symbols

Definitions

DO

Data Owner

CSP

Cloud Service Provider

RDPC

Remote Data Possession Checking

DV

Designated Verifier

PDP

Provable Data Possession

PoR

Proof of Retrievability

PKI

Public Key Infrastructure

CA

Certificate Authority

CDH

Computational Diffie-Hellman

WDH

Weil Diffie-Hellman

KGC

Key-Generation Center

IBS

Identity-Based Signature

\(\mathbb G, \mathbb G_{1}, \mathbb G_{2}\)

cyclic groups

q

the order of \(\mathbb G_{1}\) and \(\mathbb G_{2}\)

\(\mathbb Z_{q}\)

{0,1,q−1}

g

the generator of \(\mathbb G_{1}\)

e

bilinear map from \(\mathbb G_{1}\times \mathbb G_{1}\) to \(\mathbb G_{2}\)

H,H1,H2

hash functions

params

system parameter

msk

master secret key

trd

trapdoor of DV

F

original data file

Fid

filename of F

n

number of blocks for F

T

authenticated data file

TFid

generated IBS

chal

the challenge message

Γ

the returned proof