Skip to main content

Advances, Systems and Applications

Table 3 Performance Comparison of Proposed MECC and Existing Techniques in terms of Key Generation Time and Security Level

From: A secure data deduplication system for integrated cloud-edge networks

Sl. No

Encryption Algorithms

Key Generation Time (ms)

Security (%)

1

Proposed MECC

425.21

96

2

ECC

612.32

90

3

RSA

765.54

87.5

4

DH

856.33

85