Research Article
Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
Table 1
Comparison of the security requirements.
| | Bilinear pairing | Key escrow problem | Receiver anonymity | Re-key-generation |
| Wang and Yang [41] | Used | Insecure | Offer | KGC/BC | Maiti and Misra [37] | Used | Insecure | Offer | Sender | Sun et al. [38] | Used | Insecure | Offer | Sender | Yin et al. [39] | Used | Insecure | Offer | Sender | Chunpeng et al. [40] | Used | Insecure | Offer | Sender | Proposed scheme | Not used | Secure | Offer | Sender |
|
|