Research Article
CLE against SOA with Better Data Security Storage to Cloud 5G
Table 1
Comparison in exponent, pairing, and security model.
| | Exponent | Pairing | Security model | Need key escrow? | Simplified proof? |
| Scheme [3] | 14 | 5 | SM | Yes | — | Scheme [3] | 15 | 1 | SM | Yes | — | [14] | 6 | 2 | ROM | No | No | | 6 | 2 | ROM | No | Yes |
|
|