Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
| Schemes | Communication cost |
| Yu et al.’s scheme [13] | |S| + |m| | Kushwah et al.’s scheme [35] | |S| + |m| | Wei et al.’s scheme [36] | 7|S| + |m| | Shen et al.’s scheme [37] | 4|S| + |m| | Zhou et al.’s scheme [39] | |S| + |m| | Proposed scheme | 3|Zn| + |m| |
|
|