Research Article
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
Table 1
Comparison of computational costs.
| Schemes | S-I-K | K-U-H | K-U-U | Sc | Un-Sc | Model | Technology |
| [33] | 4 | 3 | 0 | | | S | Identity-based | [34] | 5 | 4 | 0 | | | S | PKI-based | [35] | | | 0 | | | ROM | Identity-based | [38] | 4 | 3 | 0 | | | S | Identity-based | [43] | 0 | 0 | 0 | | | ROM | Attribute-based | Ours | | | 0 | 7 | 8 | ROM | Certificateless |
|
|
Note. represents the number of attributes.
|