Table 2.
Security analysis comparison of proposed scheme and other schemes.
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
|---|---|---|---|---|---|---|---|---|
| Barman, [60] | N | N | N | N | N | n | N | |
| Joglekar, [62] | N | N | N | N | N | N/A | N/A | N |
| Muthukuru, [59] | Y | N | N | N | N | n | N | |
| Duarah, [61] | N | N | N | N | N | n | N | |
| Das, [55] | N | N | N | N | N | N/A | N/A | N |
| Proposed scheme | Y | Y | Y | Y | Y | Y |
1. IND-CPA; 2. IND-CCA; 3. Resistance to malleability attack; 4. Integrity; 5. Authenticated encryption; 6. Complexity of mapping phase; 7. No of rounds based on n appending bits; 8. Offers nonrepudiation