Research Article
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Table 2
Communication costs between algorithms for the GQ-SM-IBI scheme.
| Algorithms | Bitstring
| Elements of | Elements in |
| TA-User (Extract) | 1 | 0 | 1 | TA-SEM (Extract) | 1 | 0 | 1 | SEM-User (Identification) | 1 | 1 | 2 | User-Verifier (Identification) | 1 | 1 | 2 |
|
|