Table 3: Computation overhead of social data sharing.

Data encryptionData decryptionData reencryption key generationData reencryptionData authorized decryption