Table 4.
Hahn Scheme [13] |
Jiang Scheme [12] |
Yu Scheme [22] |
Qi Li Scheme [5] |
|||
---|---|---|---|---|---|---|
Encryption |
|
|
||||
Partial decryption (server) | - | - | ||||
Final decryption (user) | E+M+H+1Dec | |||||
Message verification | - | - | - | 2H | ||
Premkamal Scheme [17] |
Jiguo Li Scheme [18] |
Proposed Scheme | ||||
Encryption |
|
|
|
|||
Partial decryption (server) |
+2M | |||||
Final decryption (user) |
1Dec | |||||
Message verification | E+3M+H | 2H | ||||
|