Skip to main content

Advances, Systems and Applications

Table 3 Communication cost comparison

From: A threshold hybrid encryption method for integrity audit without trusted center

Scheme

Communication cost

Ref. [4]

NU|h|

Ref. [8]

2R|m|+NU|h|

Ref.[31]

(3 + 2NU)|m|+NU|h|

Ref. [36]

(2K+R)|m|+NU|h|

Ours

NU|h|