Security and Communication Networks / 2019 / Article / Tab 2

Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Table 2

Feature comparison of schemes.

Maleka et al. [29]Harn et al. [30]Pilaram and Eghlidos [10]Traverso et al. [17]Our scheme

Number of roundsMultiple roundsMultiple roundsOne roundOne roundOne round
Trusted third partyNoNoYesYesNo
Communication costO (tk)O (t)O (1)O (t)O (1)

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.