Skip to main content

Advances, Systems and Applications

Table 3 The comparisons on the storage costs

From: Identity-based remote data checking with a designated verifier

Protocol KGC DO DV or TPA
Our Protocol \(|\mathbb Z_{q}|\) \(|\mathbb G_{1}|\) \(|n|+2|\mathbb Z_{q}|+|\mathbb G_{1}|\)
Li et al. [8] \(|\mathbb Z_{q}|\) \(|\mathbb G_{1}|\) \(|n|+2|\mathbb Z_{q}|+|Fid|\)
Yu et al. [9] \(|\mathbb Z_{q}|\) \(|\mathbb G_{1}|\) \(|n|+|\mathbb Z_{q}|+|\mathbb G_{1}|+|\mathbb G_{2}|+|pf|\)
Ji et al. [4] \(|\mathbb Z_{q}|\) \(2|\mathbb Z_{q}|\) \(|n|+|\mathbb Z_{q}|\)