Table 9.
Cryptographic Operations Utilised in the Un-Signcryption Phase.
| Authors and Ref. No. | Unsigncryption |
|---|---|
| Amin et al. [80] | 2 |
| Wang and Liu [69] | 1 + 1 |
| Li and Hong [70] | 1 |
| Jawaid et al. [83] | |
| Mutaz et al. [71] | |
| Lu et al. [72] | |
| Li et al. [73] | |
| Prameela & Ponmuthuramalingam [74] | |
| Omala et al. [75] | |
| Omala et al. [81] | |
| Gao et al. [82] | |
| Ullah et al. [84] | |
| Jawaid et al. [76] | 1 + 2 |
| Noor et al. [85] | |
| Hu et al. [77] | 3 + 2 |