Research Article
Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud
Table 2
Comparison of computation time in the auditing phase.
| Scheme | The number of the challenged blocks | | | |
| Computation time in Yu et al.’s scheme (s) | 0.644 | 0.9733 | 2.31 | Computation time in Zhang et al.’s scheme (s) | 0.109 | 0.161 | 0.333 | Computation time in our scheme (s) | 0.616 | 0.9367 | 2.02 |
|
|