Research Article

Asynchronous Group Authentication Based on Geometric Approach

Table 2

Comparison with other group authentication.

ā€‰Manage modeThreshold restrictionInformation rateBasic theory

Literature[4]Centralizedāˆ–Public key algorithm
Literature[10]Distributed<1Lagrange interpolation
Literature[12]Distributed1Chinese remainder theorem
Literature[13]Centralized<1Lagrange interpolation
Our schemeDistributed1Sphere renconstruction