Research Article
Certificateless Public Auditing Protocol with Constant Verification Time
Table 3
Comparison between certificateless public auditing schemes. Let be the bilinear pairing computation and be the multiplication in group . Let and be the hash-to-point computation and the exponentiation in group , respectively. Let be the number of the challenged blocks.