Research Article
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network
| Algorithms | KeyGen | Enc | RKenGen | ReEnc | Dec(Or) | Dec(Re) | (ms) | (ms) | (ms) | (ms) | (ms) | (ms) |
| scheme [22] | 3.279 | 4.662 | 6.441 | 4.971 | 5.082 | 6.506 |
| Our scheme | 3.795 | 5.103 | 6.061 | 9.017 | 5.602 | 7.032 |
|
|