Research Article

Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds

Table 3

Execution time of cryptographic operations.

Cryptographic operationComputing time (ms)

Bilinear pairing4.211
Exponentiation in group 1.709
Map-to-point hash function4.406