Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Table 2

Feature comparison of schemes.

ā€‰Maleka et al. [29]Harn et al. [30]Pilaram and Eghlidos [10]Traverso et al. [17]Our scheme

FairnessNoYesYesNoYes
Number of roundsMultiple roundsMultiple roundsOne roundOne roundOne round
Trusted third partyNoNoYesYesNo
InteractiveYesYesNoYesNo
ComputationUserUserUserUserCSP
Communication costO (tk)O (t)O (1)O (t)O (1)