Skip to main content
. 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158

Table 2.

Security analysis comparison of proposed scheme and other schemes.

1 2 3 4 5 6 7 8
Barman, [60] N N N N N O(nlogn) n N
Joglekar, [62] N N N N N N/A N/A N
Muthukuru, [59] Y N N N N O(nlogn) n N
Duarah, [61] N N N N N O(nlogn) n N
Das, [55] N N N N N N/A N/A N
Proposed scheme Y Y Y Y Y O(nlogn) 2n Y

1. IND-CPA; 2. IND-CCA; 3. Resistance to malleability attack; 4. Integrity; 5. Authenticated encryption; 6. Complexity of mapping phase; 7. No of rounds based on n appending bits; 8. Offers nonrepudiation