Research Article
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Algorithm 1
Hybrid Cloud Security Algorithm.
Input: Outsource field (), | Output: Response of TPA (TRUE or FALSE) () | () Initialize domain parameters () | () Begin | () Choose a point in elliptic curve (). | () Select pseudorandom number as a secret key . | () Public key // Key pair generation | () Select the random number within the range () | () Hash value of message blocks | () Random point | () Calculate | () Calculate | // Signature set creation | () Generate block tag for each block | () Client generates Index Hash Table (IHT) with server oriented parameters , , and AAI () | () Generate hash table IHT | () Unique hash value () = record in index Hash Table ). | () = difference between existing and new entries in IHT | () If () | () Update the hash value in table | () Else | () Goto step () | () end // Proof generation | () Check and | () if (check ≠ ) | () terminate the process | () else | () | () If () | () output = error | () else | () | () if (temp == σ) | () = TRUE | () else | () = FALSE | () end // Proof verification | () if ( = TRUE) | () = blooming(message, integer, hash value) | () else | () Goto step () | () end |
|