Research Article

A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network

Table 2

Execute time comparison.

Algorithms KeyGenEncRKenGenReEncDec(Or)Dec(Re)
(ms)(ms)(ms)(ms)(ms)(ms)

scheme [22]3.2794.6626.4414.9715.0826.506

Our scheme3.7955.1036.0619.0175.6027.032