Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 2

Computational cost.

SchemesGeneralized signcryptGeneralized unsigncryptTotal

Yu et al.’s scheme [13]4bpm + 1bp + 1mexp1bpm + 3bp + 3mexp5bpm + 4bp + 4mexp
Kushwah et al.’s scheme [35]5bpm + 2mexp4bpm + 2bp + 3mexp9bpm + 2bp + 5mexp
Wei et al.’s scheme [36]9bpm + 1bp + 7mexp2bpm + 4bp11bpm + 5bp + 7mexp
Shen et al.’s scheme [37]2bpm + 6mxp5bpm + 2mexp7bpm + 8mexp
Zhou et al.’s scheme [39]3bpm + 1bp1bpm + 2bp4bpm + 3bp
Proposed6 hm5 hm11 hm

hm = hyperelliptic curve divisor multiplication, em = elliptic curve scalar multiplication, bp = bilinear pairing, bpm = pairing-based point multiplications, mexp = modular exponentiation.