Research Article
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption
Table 1
Comparison of computation in secure data collaboration.
| Schemes | Enc | ReEnc | Dec-1 | Dec-2 |
| IBBPRE [6] | Tpair+(Nu+5)Texp | (3Nu+3)Texp | 2Tpair+NuTexp | 3Tpair+Texp |
| IBCPRE [7] | Tpair+4Texp | 2Tpair | Tpair | 2Tpair |
| IBBCPBRE [8] | (3Nu+8)Texp | 2Tpair+NuTexp | 2Tpair+NuTexp | 3Tpair+NuTexp |
| Our scheme | IBE | 9Texp | Type-I | 2Tpair | Tpair | 2Tpair | Type-II | Tpair | IBBE | (3Nu+10)Texp | Type-III | 3Tpair+(Nu+1)Texp | 2Tpair+NuTexp | 3Tpair+NuTexp | Type-IV | 2Tpair+NuTexp |
|
|