Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2018
/
Article
/
Tab 3
/
Research Article
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
Table 3
Comparison of computation complexity.
Scheme
Encryption
Decryption
Key Generation
(Data owner)
(User)
[
2
]
[
4
]
Ours