Fig. 3From: Identity-based remote data checking with a designated verifierTime-Consumption for the Generation of Returned ProofBack to article page