Research Article

A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network

Table 1

Efficiency and security comparison.

Schemes EMO scheme [22]Our IB-PRE scheme

Public/Private
key size//

Re-encryption key size

Level 1/Level 2
ciphertext size//

Rekey generation/
Re-encryption cost//

Without RO?āœ“

Collusion resistantāœ“