Table 1 Comparison of PKEET scheme characteristics.

From: A compact public key encryption with equality test for lattice in cloud computing

PKEET

scheme

Hard

assumption

Security model

Application

backgroud

Post-quantum

security

Ma et al.19

BDH

ROM

No

No

Zhang et al.21

BDH

ROM

No

No

Elhabob et al.23

BDH

ROM

IoV

No

Duong et al.24

LWE

SDM

No

Yes

Duong et al.25

RLWE/RSIS

SDM

No

Yes

Roy et al.26

LWE/RLWE

SDM

No

Yes

Xiao et al.27

LWE

SDM

No

Yes

Ours

LWE

ROM

IoV

Yes