Fig. 4From: Identity-based remote data checking with a designated verifierTime-Consumption for the DV’s VerificationBack to article page