Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
| Schemes | Generalized signcrypt | Generalized unsigncrypt | Total |
| Yu et al.’s scheme [13] | 4bpm + 1bp + 1mexp | 1bpm + 3bp + 3mexp | 5bpm + 4bp + 4mexp | Kushwah et al.’s scheme [35] | 5bpm + 2mexp | 4bpm + 2bp + 3mexp | 9bpm + 2bp + 5mexp | Wei et al.’s scheme [36] | 9bpm + 1bp + 7mexp | 2bpm + 4bp | 11bpm + 5bp + 7mexp | Shen et al.’s scheme [37] | 2bpm + 6mxp | 5bpm + 2mexp | 7bpm + 8mexp | Zhou et al.’s scheme [39] | 3bpm + 1bp | 1bpm + 2bp | 4bpm + 3bp | Proposed | 6 hm | 5 hm | 11 hm |
|
|
hm = hyperelliptic curve divisor multiplication, em = elliptic curve scalar multiplication, bp = bilinear pairing, bpm = pairing-based point multiplications, mexp = modular exponentiation.
|