Skip to main content
. 2022 Jan 29;22(3):1072. doi: 10.3390/s22031072

Table 3.

Limitations of Bilinear Pairing based Signcryption Schemes presented for securing WBANs.

Authors and Ref. No. Publication Year Limitations
Wang and Liu [69] 2015
  • Fails to address the key escrow issue

  • High computing power consumption and increased nature of communication bandwidth due to bilinear pairing

Li and Hong [70] 2016
  • Affected by a partial distribution of private keys

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Mutaz et al. [71] 2018
  • Affected by a partial distribution of private keys

  • Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Lu et al. [72] 2018
  • The scheme may experience issues with private key distribution and key escrow due to the use of the PKG principle

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Li et al. [73] 2018
  • Affected by a partial distribution of private keys

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Prameela and Ponmuthuramalingam [74] 2018
  • Affected by a partial distribution of private keys

  • Use bilinear pairing for security hardness which is a computationally intensive operation

Anyembe et al. [75] 2018
  • Affected by a partial distribution of private keys

  • Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Iqbal et al. [76] 2019
  • Affected by a partial distribution of private keys

  • Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation

Hu et al. [77] 2021
  • Affected from key escrow problem of identity-based cryptography

  • Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration

  • Utilize bilinear pairing for security hardness which is a computationally intensive operation