Research Article
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)
Table 3
Computational cost comparisons on the basis of major operations.
| Schemes | Involves participants | Reencryption | Encryption | Proxy reencryption | Decryption | Total |
| Xu et al.’s [20] | 2 EXPO | 3 EXPO + 1 BPR | 3 EXPO + 1 BPR | 2 BPR | 8 EXPO + 4 BPR | Guo et al.’s [23] | 5 EXPO | 3 EXPO + 2 BPR | 5 EXPO + 1 BPR | 8 EXPO + 2 BPR | 21 EXPO + 5 BPR | Lee and Han’s 1 [24] | 3 EXPO | 4 EXPO | 1 EXPO | 4 EXPO | 12 EXPO | Lee and Han’s 2 [24] | 3 EXPO | 5 EXPO | 3 EXPO | 10 EXPO | 21 EXPO | Wang et al.’s [25] | 3 EXPO | 4 EXPO | 1 EXPO | 7 EXPO | 15 EXPO | Srinivasan and Rangan’s [22] | 5 EXPO | 8 EXPO | 1 EXPO | 6 EXPO | 20 EXPO | Bhatia et al.’s [17] | 4 PM | 5 PM | 1 PM | 7 PM | 17PM | Wang et al.’s [13] | 1 EXPO | 2 SM + 2 BPR | 1 BPR | 1 BPR + 1 SM | 1 EXPO + 3 SM + 4 BPR | Proposed | 4 HDM | 5 HDM | 1 HDM | 3 HDM | 13 HDM |
|
|