Skip to main content
. 2017 Sep 14;17(9):2117. doi: 10.3390/s17092117

Table 1.

The comparison of related work on the security assumptions.

Schemes The Underlying Mathematical Assumptions
[15] Computational Diffie-Hellman (CDH)
[19] Discrete Logarithm (DL)
[20] RSA
[6] Quadratic Residues
IBMSCR-1 Cubic Residues
IBMSCR-2 Cubic Residues