Advances, Systems and Applications
Ref. | Data Owner | Cloud Service Provider | Third Party Auditor |
---|---|---|---|
[88] | \(jHash+(j*k)Exp + jAdd+ jExp\) | \(Hash+kMulExp + kAdd+ Exp+(k+1)Mul\) | \(Hash+kHash+kMulExp + 3Exp+Mul+ 2Pair+Mul\) |
[89] | \(2jHash+4jExp+2jAdd+2jMul+ 2jMul\) | \(Hash+ Mul+Exp+Mul+Add+Exp\) | \(KHash+2Exp+(k+1)Mul+Mul+Exp\) |
[90] | \(jHash+jExp+jMul+Add\) | \(Exp+(k-1)Mul+(k-1)Add+kExp\) | \(4Pair+2(k-1)Add+2Mul+2Exp+ (k+1)Mul+KHash+(k+1)Exp\) |
[133] | \(jHash+2jExp+jAdd+jMul+ jMul\) | \(j+2Exp+ (j+1)Mul+(k+1)Exp+kMul\) | \(4Pair+(k+2)Exp+(j+2)Exp\) |
[78] | Add | \(n(2Exp +Mul + Hash\) | \(KHash + 2Hash+2(k+1) Mul+(2k+3)Exp+2Pair+ (k-1)Add +k Mul\) |
[87] | \(10*j (Add+Shift+Sub+MixC)+ j*Hash\) | j|k| | \(j*Hash+Com\) |
[105] | \(j(Hash+Mul+Enc)+Exp\) | \((j-1)Mul+2Exp\) | Not Applicable |
[91] | \(4Encrypt+4Add\) | 2Decrypt | \(2Decrypt+Encrypt+Add+Comp\) |
[97] | \(jHash+ jMul+ jAdd + jInv\) | \(Hash+ 2Add+Mul+Inv+4Mul\) | \(Mul+ 2Pair+Add\) |
[135] | \(jHash+2jExp+jAdd+jMul+ jMul\) | \(j*k(Add+Mul+ jExp_{G1}+Mul\) | \((j+k+1)Mul+ 2Pair+ (j+k)Exp\) |
[94] | \(4jMul+ jHash+ Exp\) | \(4Mul+ Exp\) | kAdd |