Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
Table 3
Computational cost in milliseconds.
| Schemes | Generalized signcrypt (ms) | Generalized unsigncrypt (ms) | Total (ms) |
| Yu et al.’s scheme [13] | 33.39 | 58.38 | 86.23 | Kushwah et al.’s scheme [35] | 24.05 | 50.79 | 74.84 | Wei et al.’s scheme [36] | 62.44 | 68.22 | 130.66 | Shen et al.’s scheme [37] | 16.12 | 24.05 | 40.17 | Zhou et al.’s scheme [39] | 27.83 | 34.11 | 61.94 | Proposed | 2.88 | 2.40 | 5.28 |
|
|