Skip to main content
. 2022 Jun 13;78(17):18777–18824. doi: 10.1007/s11227-022-04586-1

Table 3.

The comparison of IoT-friendly Proxy Re-Encryption primitives (SPoF: Single Point of Failure)

PRE schemes Unique feature Key Escrow free Decentralized Collusion resistant Lightweight Identity-based No SPoF Non-transitive Bi-direction Authorization Revocation
Dent et al. [103] Hybrid
Jiang et al. [104] Encryption switching -
Patil et al. [105] Hierarchical structure
Su et al.[106] Node revocation
Ahene et al. [107] Signcryption-driven -
Guo et al. [108] Accountability
Hou et al. [111] Quantum-resistant -
Ahene et al. [116] Non-repudiation
Koe et al. [117] Offline delegator
Phuong et al. [118] Puncturable encryption
Chunpeng et al. [119] Broadcasting -
Manzoor et al. [120] Blockchain-based
Agyekum et al. [126] Blockchain-based
Dutta et al. [112] Quantum-resistant