Table 3.
The comparison of IoT-friendly Proxy Re-Encryption primitives (SPoF: Single Point of Failure)
| PRE schemes | Unique feature | Key Escrow free | Decentralized | Collusion resistant | Lightweight | Identity-based | No SPoF | Non-transitive | Bi-direction | Authorization | Revocation |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Dent et al. [103] | Hybrid | – | – | – | – | – | – | – | |||
| Jiang et al. [104] | Encryption switching | – | - | – | – | – | – | – | – | – | |
| Patil et al. [105] | Hierarchical structure | – | – | – | – | – | |||||
| Su et al.[106] | Node revocation | – | – | – | – | – | – | – | |||
| Ahene et al. [107] | Signcryption-driven | – | – | – | – | – | - | – | – | ||
| Guo et al. [108] | Accountability | – | – | – | – | – | – | – | – | ||
| Hou et al. [111] | Quantum-resistant | - | – | – | – | – | – | – | – | ||
| Ahene et al. [116] | Non-repudiation | – | – | – | – | – | – | – | – | ||
| Koe et al. [117] | Offline delegator | – | – | – | – | – | – | – | – | – | – |
| Phuong et al. [118] | Puncturable encryption | – | – | – | – | – | – | – | |||
| Chunpeng et al. [119] | Broadcasting | – | – | - | – | – | – | – | |||
| Manzoor et al. [120] | Blockchain-based | – | – | – | – | – | |||||
| Agyekum et al. [126] | Blockchain-based | – | – | – | – | – | – | ||||
| Dutta et al. [112] | Quantum-resistant | – | – | – | – | – | – | – |