Table 3.
The comparison of IoT-friendly Proxy Re-Encryption primitives (SPoF: Single Point of Failure)
PRE schemes | Unique feature | Key Escrow free | Decentralized | Collusion resistant | Lightweight | Identity-based | No SPoF | Non-transitive | Bi-direction | Authorization | Revocation |
---|---|---|---|---|---|---|---|---|---|---|---|
Dent et al. [103] | Hybrid | – | – | – | – | – | – | – | |||
Jiang et al. [104] | Encryption switching | – | - | – | – | – | – | – | – | – | |
Patil et al. [105] | Hierarchical structure | – | – | – | – | – | |||||
Su et al.[106] | Node revocation | – | – | – | – | – | – | – | |||
Ahene et al. [107] | Signcryption-driven | – | – | – | – | – | - | – | – | ||
Guo et al. [108] | Accountability | – | – | – | – | – | – | – | – | ||
Hou et al. [111] | Quantum-resistant | - | – | – | – | – | – | – | – | ||
Ahene et al. [116] | Non-repudiation | – | – | – | – | – | – | – | – | ||
Koe et al. [117] | Offline delegator | – | – | – | – | – | – | – | – | – | – |
Phuong et al. [118] | Puncturable encryption | – | – | – | – | – | – | – | |||
Chunpeng et al. [119] | Broadcasting | – | – | - | – | – | – | – | |||
Manzoor et al. [120] | Blockchain-based | – | – | – | – | – | |||||
Agyekum et al. [126] | Blockchain-based | – | – | – | – | – | – | ||||
Dutta et al. [112] | Quantum-resistant | – | – | – | – | – | – | – |