Research Article
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments
Algorithm 2
Precomputation process for integrity auditing.
: a ciphertext , a file tag value , | a secret key , the highest challenge | : an expected response array | (1) for in | (2) | (3) for in | (4) | (5) | (6) | (7) | (8) | (9) | (10) return |
|