Research Article

Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

Table 2

Communication costs between algorithms for the GQ-SM-IBI scheme.

Algorithms Bitstring Elements of Elements in

TA-User (Extract) 1 0 1
TA-SEM (Extract) 1 0 1
SEM-User (Identification) 1 1 2
User-Verifier (Identification) 1 1 2