Research Article

Multiuser Searchable Encryption with Token Freshness Verification

Table 2

Comparative analysis: storage-computational complexity.

SchemesStorage overheadComputational overhead
CiphertextTokenEncryption()TokGen()Search()

Hwang and Lee 2007 [9]
Kiayias et al. 2016 [17]
Zhang et al. 2016 [18]
Wang et al. 2016 [19]
B. Zhang and F. Zhang 2011 [21]
Ding et al. 2012 [22]
Chen et al. 2012 [23]
MUSE-TFV

: number of keywords in the system, : number of keywords in a query, : number of users in the system, : number of users accessing an associated file, : size of a message digest output by the used hash function, : size of an element from bilinear groups and , : ciphertext size of the used encryption routine, : size of a random integer, : pairing, : exponentiation, : scalar multiplication, : modular multiplication, : data comparison, and : set union operation.