Skip to main content
. 2023 Sep 26;23(19):8090. doi: 10.3390/s23198090

Table 1.

Summary of standard cryptography for location information [35].

Scheme Configuration Authority Integration Shared Secret 1
Check Sum Yes
Encryption 2 + Signature 2 Yes Yes Yes
Digital Signature 2 Yes Yes
Authenticated Encryption Yes Yes Yes Yes
Message Authentication Yes Yes Yes
Secret-Key Encryption Yes Yes Yes Yes
Public-Key Encryption 2 Yes Yes

1 shared key generated using user input and random number, 2 it I used for authentication process.