Research Article

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication

Table 1

Comparison of security requirements.

Without bilinear pairing (yes/no)Secure for the key escrow problem (secure/insecure)Partial key verifiability (offer/not offer)Receiver anonymity (offer/not offer)Decryption fairness (offer/not offer)Message integrity (offer/not offer)Participant verifiability (offer/not offer)

Sur et al. [30]XXXXX
Hung et al. [32]XXXX
Gao et al. [34]X
Deng [35]XX
Zhu [36]XXXXX
Win et al. [37]XXX
Wang et al. [38]XXX
Proposed scheme

√: yes/offer/secure. X: no/not offer/insecure.