Advances, Systems and Applications
From: A threshold hybrid encryption method for integrity audit without trusted center
Scheme | Privacy preservation | Shared data | Group management | Verification | Revocation | Without trusted center |
---|---|---|---|---|---|---|
PAPNDS [4] | \({\checkmark }\) | ✗ | ✗ | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) |
Panda [8] | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) |
PDP [19] | ✗ | ✗ | ✗ | ✗ | ✗ | \({\checkmark }\) |
IIADSSIH [23] | \({\checkmark }\) | \({\checkmark }\) | ✗ | ✗ | ✗ | \({\checkmark }\) |
CoRPA [31] | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | ✗ |
EURI [32] | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | ✗ |
Oruta [36] | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) |
Ours | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) | \({\checkmark }\) |