Certificateless chameleon hash scheme based on RSA assumption

Tejeshwari Thakur, Birendra Kumar Sharma


Certificatelesspublickeycryptography(CL-PKC),doesnotrequiretheuseofthecertificatetoguarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who is in possession of a master key. CL-PKC does not suffer from the key escrow property. Thus, CL-PKC can be seen as a model for the use of public key cryptography.

Full Text: PDF

Published: 2014-06-25

How to Cite this Article:

Tejeshwari Thakur, Birendra Kumar Sharma, Certificateless chameleon hash scheme based on RSA assumption, Eng. Math. Lett., 2014 (2014), Article ID 12

Copyright © 2014 Tejeshwari Thakur, Birendra Kumar Sharma. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Engineering Mathematics Letters

ISSN 2049-9337

Editorial Office: [email protected]

Copyright ©2024 SCIK Publishing Corporation