Research Article
Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
Table 1
Comparison of the security requirements.
| | Group ownership | Bilinear pairing | Key escrow problem | Receiver anonymity | Re-Key genneration |
| Wang and Wang [53] | Not provided | Used | Insecure | Offer | KGC/BC | Maiti and Misra [54] | Not provided | Used | Insecure | Offer | Sender | Sun et al. [55] | Not provided | Used | Insecure | Offer | Sender | Yin et al. [56] | Not provided | Used | Insecure | Offer | Sender | Chunpeng et al. [57] | Not provided | Used | Insecure | Offer | Sender | Kim et al. [51] | Not provided | Not used | Secure | Offer | Sender | Proposed scheme | Provided | Not used | Secure | Offer | Sender |
|
|