Research Article
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
Table 2
Feature comparison of schemes.
| ā | Maleka et al. [29] | Harn et al. [30] | Pilaram and Eghlidos [10] | Traverso et al. [17] | Our scheme |
| Fairness | No | Yes | Yes | No | Yes | Number of rounds | Multiple rounds | Multiple rounds | One round | One round | One round | Trusted third party | No | No | Yes | Yes | No | Interactive | Yes | Yes | No | Yes | No | Computation | User | User | User | User | CSP | Communication cost | O (tk) | O (t) | O (1) | O (t) | O (1) |
|
|