Scheme | Advantages | Drawback |
Lin et al.’s Scheme [5] | Is able to detect error which occurs in computational operations or the process of data transfer. Also it can able to correct such error. Applied in cloud computing. | None |
Xue et al.’s Scheme [6] | Integrates fault tolerance It is secure and more reliable with respect to chosen cipher text attack. | It is slow. |