Skip to main content

Advances, Systems and Applications

Table 1 The comparison of various auditing schemes

From: A threshold hybrid encryption method for integrity audit without trusted center

Scheme

Privacy preservation

Shared data

Group management

Verification

Revocation

Without trusted center

PAPNDS [4]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

Panda [8]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

PDP [19]

\({\checkmark }\)

IIADSSIH [23]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

CoRPA [31]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

EURI [32]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

Oruta [36]

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

Ours

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)

\({\checkmark }\)