Security and Communication Networks / 2019 / Article / Tab 2

Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Table 2

Feature comparison of schemes.

Maleka et al. [29]Harn et al. [30]Pilaram and Eghlidos [10]Traverso et al. [17]Our scheme

FairnessNoYesYesNoYes
Number of roundsMultiple roundsMultiple roundsOne roundOne roundOne round
Trusted third partyNoNoYesYesNo
InteractiveYesYesNoYesNo
ComputationUserUserUserUserCSP
Communication costO (tk)O (t)O (1)O (t)O (1)

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.