Table 9.
Cryptographic Operations Utilised in the Un-Signcryption Phase.
Authors and Ref. No. | Unsigncryption |
---|---|
Amin et al. [80] | 2 |
Wang and Liu [69] | 1 + 1 |
Li and Hong [70] | 1 |
Jawaid et al. [83] | |
Mutaz et al. [71] | |
Lu et al. [72] | |
Li et al. [73] | |
Prameela & Ponmuthuramalingam [74] | |
Omala et al. [75] | |
Omala et al. [81] | |
Gao et al. [82] | |
Ullah et al. [84] | |
Jawaid et al. [76] | 1 + 2 |
Noor et al. [85] | |
Hu et al. [77] | 3 + 2 |