Research Article

Certificateless Public Auditing Protocol with Constant Verification Time

Table 1

Security levels of certificateless public auditing schemes. Let , , and be a Type I adversary, Type II adversary, and Type III adversary as defined in Section 3, respectively. Type I adversary and Type II adversary are classed as the normal, strong, and super adversaries (ordered by the capability of the adversaries).

ā€‰ Security against Security against Security against

[28] Strong Super Secure
[29] Super Super No formal proof provided
Ours Super Super Secure