Advances, Systems and Applications
From: Identity-based remote data checking with a designated verifier
Protocol | T | Γ | Verify | DV |
---|---|---|---|---|
Our Protocol | (2n+2)·Texp+(3n)·Tmul+TIBS | ℓ·Texp+(ℓ−1)·Tmul | TVer+3·Tp+(2ℓ+1)·Texp+(2ℓ−1)·Tmul | Yes |
Li et al. [8] | (2n+1)·Texp+(2n)·Tmul+TS | (ℓ+1)·Texp+(ℓ−1)·Tmul | \(T^{\prime }_{Ver}+3\cdot T_{p}+(2\ell +2)\cdot T_{exp}+(2\ell +1)\cdot T_{mul}\) | No |
Yu et al. [9] | (2n+1)·Texp+n·Tmul+TIBS | (ℓ+1)·Texp+ℓ·Tmul+Tp | TVer+Tp+(ℓ+1)·Texp+(ℓ−1)·Tmul | No |
Ji et al. [4] | 3n·Texp+3n·Tmul | (ℓ+3)·Texp+ℓ·Tmul | 2·Tp+(ℓ+1)·Texp+(ℓ+2)·Tmul | No |