Security and Communication Networks / 2018 / Article / Tab 2

Research Article

Asynchronous Group Authentication Based on Geometric Approach

Table 2

Comparison with other group authentication.

Manage modeThreshold restrictionInformation rateBasic theory

Literature[4]CentralizedPublic key algorithm
Literature[10]Distributed<1Lagrange interpolation
Literature[12]Distributed1Chinese remainder theorem
Literature[13]Centralized<1Lagrange interpolation
Our schemeDistributed1Sphere renconstruction

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.