Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 6

Communication cost.

SchemesCommunication cost

Yu et al.’s scheme [13]|S| + |m|
Kushwah et al.’s scheme [35]|S| + |m|
Wei et al.’s scheme [36]7|S| + |m|
Shen et al.’s scheme [37]4|S| + |m|
Zhou et al.’s scheme [39]|S| + |m|
Proposed scheme3|Zn| + |m|