Research Article
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network
Table 1
Efficiency and security comparison.
| Schemes | EMO scheme [22] | Our IB-PRE scheme |
| Public/Private | | | key size | / | / |
| Re-encryption key size | | |
| Level 1/Level 2 | | | ciphertext size | / | / |
| Rekey generation/ | | | Re-encryption cost | / | / |
| Without RO? | | ā |
| Collusion resistant | | ā |
|
|