Research Article
Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things
Table 1
Comparison of the CL-PKE schemes.
| Schemes | Enc | Dec | Sec-Lev | Sec-Ass |
| [2] | 3P + 1S + 1E | 1P + 1S | IND-CCA secure | GBDHP | [4] | 1P + 2S + 1E | 1P + 2S | IND-CCA secure | BDH | [5] | 3S + 1E | 1P + 3S | IND-CCA secure | K-BDHI | [6] | 1P + 3S + 1E | 4P | Strong type I/II secure | 3-DDH | [7] | 2P + 2S + 2E | 2P + 1S | IND-CCA secure | BDH | Our scheme | 1P + 2S | 1P | IND-CCA secure | BDH/RSA |
|
|