Research Article
Secure Information Sharing System for Online Patient Networks
Table 8
The comparison of group key security performance.
| Scheme | Revocation Limit | Forward Secrecy | Backward Secrecy | Collusion Resistance |
| Staddon et al. | | Yes | No | No |
| Liu et al. | | Yes | No | No |
| Rams et al. | | Yes | Yes | Yes |
| Guo et al.’s basic scheme | | Yes | No | No |
| Guo et al.’s new scheme | | Yes | Yes | Yes |
| SISS | | Yes | Backward Accessibility | Yes |
|
|
: maximum revoked users, : maximum session. |