Research Article
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
Table 3
Comparison of computation costs.
| |||||||||||||||||||||||||||||||||||
P1: key extraction phase, P2: block tag generation phase, P3: prove phase, P4: verify phase; E: exponential operation and its time cost, S: scalar multiplication and its time cost, H: hash computation and its time cost, B: bilinear pairing and its time cost. |