Research Article
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Table 4
Communication costs between algorithms for the BNN-SM-IBI scheme.
| Algorithms | Bitstring | Elements in | Elements in |
| TA-User (Extract) | 1 | 1 | 1 | TA-SEM (Extract) | 1 | 1 | 1 | SEM-User (Identification) | 1 | 3 | 2 | User-Verifier (Identification) | 1 | 3 | 2 |
|
|