Research Article
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Table 2
Performance efficiency comparison in terms of the total number of pairing operations required among proxy signcryption schemes.
| ā | LC | WC | DCZ | EA | LWHY | Ours |
| Pairing operations for PCG | 3 | 2 | 3 | 3 | 0 | 0 | Pairing operations for SMG | 2 | 1 | 2 | 2 | 1 | 1 | Pairing operations for SRV | 8 | 3 | 4 | 7 | 3 | 2 | The total computation cost (number of pairing operations) | 13 | 6 | 9 | 12 | 4 | 3 |
|
|