Research Article
Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks
Table 2
Comparison of computation cost.
| ||||||||||||||||||||||||||||||||||||||||||
1: setup; 2: partial-private-key extraction; 3: set-public key; 4: tag generation; 5: proof phase; 6: verify phase. |