Research Article
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
Table 3
Comparison of computational cost in various schemes.
| ||||||||||||||||||||||||||||
Note. represent sliding window numbers of , original window numbers of , hash operations, number of windows for verification, numbers of corresponding nodes in , and exponentiation operation, respectively. |