Certificateless chameleon hash scheme based on RSA assumption

Tejeshwari Thakur, Birendra Kumar Sharma


Certificatelesspublickeycryptography(CL-PKC),doesnotrequiretheuseofthecertificatetoguarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who is in possession of a master key. CL-PKC does not suffer from the key escrow property. Thus, CL-PKC can be seen as a model for the use of public key cryptography.

Full Text: PDF

Published: 2014-06-25

How to Cite this Article:

Tejeshwari Thakur, Birendra Kumar Sharma, Certificateless chameleon hash scheme based on RSA assumption, Engineering Mathematics Letters, Vol 2014 (2014), Article ID 12

Copyright © 2014 Tejeshwari Thakur, Birendra Kumar Sharma. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Engineering Mathematics Letters

ISSN 2049-9337

Editorial Office: office@scik.org

Copyright ©2019 SCIK Publishing Corporation. All rights reserved.