Research Article
Certificateless Public Auditing Protocol with Constant Verification Time
Table 1
Security levels of certificateless public auditing schemes. Let , , and be a Type I adversary, Type II adversary, and Type III adversary as defined in Section 3, respectively. Type I adversary and Type II adversary are classed as the normal, strong, and super adversaries (ordered by the capability of the adversaries).