Research Article
Secure Certificateless Signature with Revocation in the Standard Model
Table 1
Comparisons between our scheme and the previously proposed schemes.
| | Liu et al.’s scheme [16] | Xiong et al.’s scheme [17] | Yuan et al.’s scheme [18] | Yu et al.’s scheme [21] | Our scheme |
| Computational cost for signature | 6 | 6 | 9 | 7 | 2 | Computational cost for verification | 6 | 3 | 6 | 5 | 7 | Against Type I adversary | Yes | No | No | No | Yes | Against Type II adversary | No | Yes | Yes | No | Yes | Revocation mechanism | No | No | No | No | Yes | Against Type III adversary | — | — | — | — | Yes | Security assumption | NGBDH Many-DH | NGBDH Many-DH | AC-DH 2-Many-DH | NGBDH Many-DH | CDH |
|
|