Table 3.
Scheme | Parameter Generation | Signing | Verification | |||||||
---|---|---|---|---|---|---|---|---|---|---|
SM | H | PO | SM | IO | H | PO | SM | IO | H | |
AES [28] | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 2 | 0 | 1 |
DES [29] | 1 | 0 | 2 | 1 | 1 | 1 | 0 | 4 | 1 | 1 |
IDEA [30] | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 1 |
HMAC [31] | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 1 | 1 |
Diffe Hellman [32] | 1 | 0 | 2 | 1 | 1 | 1 | 0 | 2 | 0 | 1 |
MPKG [33] | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 1 |
Proposed Scheme | 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 |
Note: Inversion Operation (IO), Pairing Operation (PO), scalar multiplication (SM) for the hash function (H).