Research Article
Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds
Table 2
Comparison of computing costs.
| Procedure | Our DS-IBE-AET construction | Zhao et al.s construction [9] |
| UKeyExt | KGC | 3 + 3 | — | User | 6 + 3 | 3 | SKeyExt | KGC | 1 + 1 | — | Server | 2 + 1 | 2 | Encrypt | 2 + 3 + 4 | 4 + 2 + 3 | Decrypt | 1 + 3 + 3 | 4 + 2 + 3 | Authen | 2 + 2 + 2 | 2 + 1 | DecAuth | Decryption | 1 + 1 | 1 + 1 | Verification | 2 + 1 | 1 | | 2 + 2 | 4 + 2 + 2 | | 2 + 2 | 4 + 2 + 2 |
|
|