Research Article

Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing

Table 1

Comparison of the security requirements.

Bilinear pairingKey escrow problemReceiver anonymityRe-key-generation

Wang and Yang [41]UsedInsecureOfferKGC/BC
Maiti and Misra [37]UsedInsecureOfferSender
Sun et al. [38]UsedInsecureOfferSender
Yin et al. [39]UsedInsecureOfferSender
Chunpeng et al. [40]UsedInsecureOfferSender
Proposed schemeNot usedSecureOfferSender