Research Article
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
Table 2
Required communication number.
| ā | P1 | P2 | P3 |
| Wang et al. [16] | 1 | 1 | 2 |
| Zhang et al. [17] | 1 | 1 | 2 |
| Ours | 1 | 4 | 2 |
|
|
P1: key extraction phase, P2: tag generation phase, P3: challenge and prove phase.
|