Research Article

An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree

Figure 7

The computational cost in the identification stage. (a) The running time of CS1 in identification stage with different n. (b) The running time of CS2 in identification stage with different n. (c) The integrated running time in identification stage with different n.
(a)
(b)
(c)