Skip to main content

Advances, Systems and Applications

Table 5 Comparison of communication overhead

From: Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

Scheme

System parameters

Encryption key

Ciphertext

Re-encrypted ciphertext

Ref. [47]

8|G|+2|GT|

(2|S|+4)|G|

(2|l|+5)|G|+|GT|

(2|I|+8)|G|+3|GT|

Ref. [48]

(8|U|+6)|G|+|GT|

6|S||G|

(6|l|+2)|G|+|GT|

2|G|+(2|I|+1)|GT|

Ref. [49]

6|G|+|GT|

(|S|+2)|G|

(3|l|+3)|G|

6(|I|+1)|G|+|GT|

Our scheme

6|G|+|GT|

(|S|+2)|G|

(3|l|+2)|G|+|GT|

4|G|+|GT|

  1. |G|, |GT|: the lengths of the cyclic groups G and GT; |U|: the attribute complete set size; |S|: the user attribute set size; |l|: the number of attributes in the access structure; |I|: the number of attributes that satisfy the access structure