Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Table 5

Computational complexity.

SKEHASHPKEEXPMUL

CROT4t8t3t6t + 32t + 1
ADS2t2tN/AN/AN/A
R-ADS2t2tN/AN/A4kt + 2t
Ours workN/A3tN/AN/AN/A