Research Article
Multiuser Searchable Encryption with Token Freshness Verification
Table 2
Comparative analysis: storage-computational complexity.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
: number of keywords in the system, : number of keywords in a query, : number of users in the system, : number of users accessing an associated file, : size of a message digest output by the used hash function, : size of an element from bilinear groups and , : ciphertext size of the used encryption routine, : size of a random integer, : pairing, : exponentiation, : scalar multiplication, : modular multiplication, : data comparison, and : set union operation. |