Skip to main content

Advances, Systems and Applications

Table 4 The comparisons on the computational costs

From: Identity-based remote data checking with a designated verifier

Protocol

T

Γ

Verify

DV

Our Protocol

(2n+2)·Texp+(3nTmul+TIBS

·Texp+(−1)·Tmul

TVer+3·Tp+(2+1)·Texp+(2−1)·Tmul

Yes

Li et al. [8]

(2n+1)·Texp+(2nTmul+TS

(+1)·Texp+(−1)·Tmul

\(T^{\prime }_{Ver}+3\cdot T_{p}+(2\ell +2)\cdot T_{exp}+(2\ell +1)\cdot T_{mul}\)

No

Yu et al. [9]

(2n+1)·Texp+n·Tmul+TIBS

(+1)·Texp+·Tmul+Tp

TVer+Tp+(+1)·Texp+(−1)·Tmul

No

Ji et al. [4]

3n·Texp+3n·Tmul

(+3)·Texp+·Tmul

Tp+(+1)·Texp+(+2)·Tmul

No