Research Article
Balancing Access Control and Privacy for Data Deduplication via Functional Encryption
| Symbol | Notation |
| f | Length of a file | b | Length of each file block | | Length of the hash value | N | Number of users participating in key aggregation | K | Total number of bloom filters | L | Length of bloom filter array | Q(n) | Number of common attributes in a user group | n | Number of attributes for an individual user | Hash | Computational cost of performing a hash function | CE_K | Computational cost of performing a key aggregation | Enc | Computational overhead of performing a symmetric encryption | PoW | Computational cost of performing a proof of ownership | Add | Computational cost of performing an addition |
|
|