Advances, Systems and Applications
From: Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
Scheme | System parameters | Encryption key | Ciphertext | Re-encrypted ciphertext |
---|---|---|---|---|
Ref. [47] | 8|G|+2|GT| | (2|S|+4)|G| | (2|l|+5)|G|+|GT| | (2|I|+8)|G|+3|GT| |
Ref. [48] | (8|U|+6)|G|+|GT| | 6|S||G| | (6|l|+2)|G|+|GT| | 2|G|+(2|I|+1)|GT| |
Ref. [49] | 6|G|+|GT| | (|S|+2)|G| | (3|l|+3)|G| | 6(|I|+1)|G|+|GT| |
Our scheme | 6|G|+|GT| | (|S|+2)|G| | (3|l|+2)|G|+|GT| | 4|G|+|GT| |