Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
Table 2
Performance comparison between our scheme and related schemes [
22,
30].
| Scheme | Our scheme | [30] | [22] |
| Verification efficiency | | | | Encryption efficiency | | | | Share size | | | |
|
|