Research Article
An ECC-Based Digital Signature Scheme for Privacy Protection in Wireless Communication Network
Table 1
Comparison of the computational complexity of the five schemes.
| | Signature generation | Signature verification | | DP | MM | MI | DP | MM | MI |
| | Improved scheme | 1 | 1 | 0 | 1 | 0 | 0 | | ECDSA scheme | 1 | 2 | 1 | 2 | 2 | 1 | | Huiyan scheme | 1 | 2 | 0 | 1 | 1 | 1 | | Keyuan scheme | 4 | 3 | 1 | 0 | 3 | 0 | | Jinyuan scheme | 2 | 3 | 0 | 2 | 1 | 1 |
|
|