Skip to main content

Advances, Systems and Applications

Table 4 Computational cost comparison

From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

Schemes

[24]

[28]

[29]

Ours

Encrypt

\(\left( 2n_{1}+2 \right) E+n_{1}H\)

\(\left( 4n_{1}+5 \right) E+P+H\)

\(\left( 2n_{1}+2 \right) E+\left( n_{1} +1 \right) H\)

\(n_{1}P +7E + \left( n_{1} +2 \right) H\)

KeyGen

\(\left( 2n_{2}+1 \right) E+n_{2}H\)

\(\left( 5n_{2} +8 \right) E\)

\(\left( 2n_{2}+2 \right) E+n_{2}H\)

\(\left( 2n_{2}+2 \right) E+n_{2}H\)

Token

\(-\)

\(\left( n_{2}+2\right) E+H\)

\(\left( 2n_{2}+1\right) E+H\)

\(3E+H+n_{2}P\)

Search

\(-\)

\(n_{2}E+2P\)

\(n_{2}E+P\)

3P

Decrypt

\(n_{2}E+P\)

\(\left( 2n_{2}+1 \right) P+n_{2}E\)

\(-\)

\(2E+H\)

Revocation

\(-\)

\(3n_{3} E\)

\(2n_{3} E\)

\(3n_{3} E\)