Research Article

CLE against SOA with Better Data Security Storage to Cloud 5G

Table 1

Comparison in exponent, pairing, and security model.

ExponentPairingSecurity modelNeed key escrow?Simplified proof?

Scheme [3]145SMYes
Scheme [3]151SMYes
[14]62ROMNoNo
62ROMNoYes