Skip to main content

Advances, Systems and Applications

Table 3 Performance Comparison of Proposed MECC and Existing Techniques in terms of Key Generation Time and Security Level

From: A secure data deduplication system for integrated cloud-edge networks

Sl. No Encryption Algorithms Key Generation Time (ms) Security (%)
1 Proposed MECC 425.21 96
2 ECC 612.32 90
3 RSA 765.54 87.5
4 DH 856.33 85