Research Article

Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs

Table 1

Comparison of the security requirements.

Group ownershipBilinear pairingKey escrow problemReceiver anonymityRe-Key genneration

Wang and Wang [53]Not providedUsedInsecureOfferKGC/BC
Maiti and Misra [54]Not providedUsedInsecureOfferSender
Sun et al. [55]Not providedUsedInsecureOfferSender
Yin et al. [56]Not providedUsedInsecureOfferSender
Chunpeng et al. [57]Not providedUsedInsecureOfferSender
Kim et al. [51]Not providedNot usedSecureOfferSender
Proposed schemeProvidedNot usedSecureOfferSender