Advances, Systems and Applications
Schemes | [24] | [28] | [29] | Ours |
---|---|---|---|---|
Encrypt | \(\left( 2n_{1}+2 \right) E+n_{1}H\) | \(\left( 4n_{1}+5 \right) E+P+H\) | \(\left( 2n_{1}+2 \right) E+\left( n_{1} +1 \right) H\) | \(n_{1}P +7E + \left( n_{1} +2 \right) H\) |
KeyGen | \(\left( 2n_{2}+1 \right) E+n_{2}H\) | \(\left( 5n_{2} +8 \right) E\) | \(\left( 2n_{2}+2 \right) E+n_{2}H\) | \(\left( 2n_{2}+2 \right) E+n_{2}H\) |
Token | \(-\) | \(\left( n_{2}+2\right) E+H\) | \(\left( 2n_{2}+1\right) E+H\) | \(3E+H+n_{2}P\) |
Search | \(-\) | \(n_{2}E+2P\) | \(n_{2}E+P\) | 3P |
Decrypt | \(n_{2}E+P\) | \(\left( 2n_{2}+1 \right) P+n_{2}E\) | \(-\) | \(2E+H\) |
Revocation | \(-\) | \(3n_{3} E\) | \(2n_{3} E\) | \(3n_{3} E\) |