Research Article
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication
Table 1
Comparison of security requirements.
| | Without bilinear pairing (yes/no) | Secure for the key escrow problem (secure/insecure) | Partial key verifiability (offer/not offer) | Receiver anonymity (offer/not offer) | Decryption fairness (offer/not offer) | Message integrity (offer/not offer) | Participant verifiability (offer/not offer) |
| Sur et al. [30] | X | √ | X | X | X | √ | X | Hung et al. [32] | X | √ | X | √ | X | √ | X | Gao et al. [34] | √ | √ | √ | √ | √ | √ | X | Deng [35] | X | √ | √ | √ | √ | √ | X | Zhu [36] | X | √ | X | X | X | √ | X | Win et al. [37] | √ | √ | √ | X | X | √ | X | Wang et al. [38] | X | √ | X | √ | √ | √ | X | Proposed scheme | √ | √ | √ | √ | √ | √ | √ |
|
|
√: yes/offer/secure. X: no/not offer/insecure.
|