Skip to main content

Advances, Systems and Applications

Table 4 Comparison of computational overhead

From: Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

Scheme

Encryption

Re-encryption

Decryption

Re-decryption

Ref. [47]

Tp+(3|l|+6)TE

(2|I|+3)TP

(2|I|+3)TP+TE

(2|I|+4)TP+TE

Ref. [48]

(6|l|+3)TE

(8|I|+3)TP+2TE

(4|I|+2)TP

2TP+(4|I|+1)TE

Ref. [49]

Tp+(3|l|+2)TE

(4|I|+9)TP

(2|I|+5)TP+(|I|+1)TE

3TP+2(|I|+1)TE

Our scheme

Tp+(3|l|+1)TE

(3|I|+1)TP

(3|I|+1)TP

6TP