Skip to main content

Advances, Systems and Applications

Table 3 Computation and Communcitaion efficiency comparison

From: An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

Scheme Computation Communcitaion
  PEKS Trapdoor Test |C| |T| |Pk|
Huang and Li [8] Hp+3E P+HP+E 2P+M 2\(\vert \mathbb {G}_{1} \vert \) \(\vert \mathbb {G}_{2} \vert \) \(\vert \mathbb {G}_{1} \vert \)
Li et al. [12] 2P+2Hp+3E+H P+2Hp+2E+M 2P+2E+M 2\(\vert \mathbb {G}_{1} \vert \) + \(\vert \mathbb {G}_{2} \vert \) 2\(\mathbb {G}_{1}\) *
Baek et al. [3] 2P+Hp+2E+M+H Hp+E P+M+E+H \(\vert \mathbb {G}_{1} \vert \,+\,\vert q \vert \) \(\vert \mathbb {G}_{2} \vert \) 2\(\vert \mathbb {G}_{1} \vert \)
Rhee et al. [4] P+Hp+2E+H Hp+3E+M P+Hp+2E \(\vert \mathbb {G}_{1} \vert \) 2\(\vert \mathbb {G}_{1} \vert \) 2\(\vert \mathbb {G}_{1} \vert \)
Pan and Li [10] Hp+3E+H P+Hp+3E 2P+M 2 \(\vert \mathbb {G}_{1} \vert \) 2\(\vert \mathbb {G}_{1} \vert \) + \(\vert \mathbb {G}_{2} \vert \) \(\vert \mathbb {G}_{1} \vert \)
Our Scheme P+4E+2H 4E+2H+M 2P+M+E 2\(\vert \mathbb {G}_{1} \vert \,+\,\vert \mathbb {G}_{2} \vert \) 2\(\vert \mathbb {G}_{1} \vert \) \(\vert \mathbb {G}_{1} \vert \)