Research Article
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)
Table 4
Computational cost comparisons on the basis of millisecond.
| Schemes | Involves participants | Reencryption (ms) | Encryption (ms) | Proxy reencryption (ms) | Decryption (ms) | Total (ms) |
| Xu et al.’s [20] | 2.5 | 18.65 | 18.65 | 29.08 | 69.6 | Guo et al.’s [23] | 6.25 | 33.55 | 21.15 | 39.8 | 100.75 | Lee and Han’s 1 [24] | 3.75 | 5 | 1.25 | 5 | 15 | Lee and Han’s 2 [24] | 3.75 | 6.25 | 3.75 | 12.5 | 26.25 | Wang et al.’s [25] | 3.75 | 5 | 1.25 | 8.75 | 18.75 | Srinivasan and Rangan’s [22] | 6.25 | 10 | 1.25 | 7.5 | 25 | Bhatia et al.’s [17] | 3.88 | 4.85 | 0.97 | 6.79 | 16.49 | Wang et al.’s [13] | 1.25 | 38.42 | 14.90 | 19.21 | 73.78 | Proposed | 1.92 | 2.4 | 0.48 | 1.44 | 6.24 |
|
|