Wang and Liu [69] |
2015 |
|
Li and Hong [70] |
2016 |
|
Mutaz et al. [71] |
2018 |
Affected by a partial distribution of private keys
Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration
Utilize bilinear pairing for security hardness which is a computationally intensive operation
|
Lu et al. [72] |
2018 |
The scheme may experience issues with private key distribution and key escrow due to the use of the PKG principle
Utilize bilinear pairing for security hardness which is a computationally intensive operation
|
Li et al. [73] |
2018 |
|
Prameela and Ponmuthuramalingam [74] |
2018 |
|
Anyembe et al. [75] |
2018 |
Affected by a partial distribution of private keys
Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration
Utilize bilinear pairing for security hardness which is a computationally intensive operation
|
Iqbal et al. [76] |
2019 |
Affected by a partial distribution of private keys
Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration
Utilize bilinear pairing for security hardness which is a computationally intensive operation
|
Hu et al. [77] |
2021 |
Affected from key escrow problem of identity-based cryptography
Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration
Utilize bilinear pairing for security hardness which is a computationally intensive operation
|