Fig. 2From: Identity-based remote data checking with a designated verifierTime-Consumptions for the Generations of Authentication FilesBack to article page