Research Article
Asynchronous Group Authentication Based on Geometric Approach
Table 2
Comparison with other group authentication.
| ā | Manage mode | Threshold restriction | Information rate | Basic theory |
| Literature[4] | Centralized | | ā | Public key algorithm | Literature[10] | Distributed | | <1 | Lagrange interpolation | Literature[12] | Distributed | | 1 | Chinese remainder theorem | Literature[13] | Centralized | | <1 | Lagrange interpolation | Our scheme | Distributed | | 1 | Sphere renconstruction |
|
|