Research Article
An Approach Enabling Various Queries on Encrypted Industrial Data Stream
Table 1
Comparison of basic parameters.
| |||||||||||||||||||||||||||||||||||
Let denote the length of the public key including public parameters, let denote the length of the search token (in some schemes, i.e., the private key), let denote the length of the ciphertext, and let SecLev denote the security level. Let and denote the length of the element in groups and , respectively, let denote the length of the element in the field , and let denote the dimension of the ciphertext attribute and the key attribute. |