Research Article

An Approach Enabling Various Queries on Encrypted Industrial Data Stream

Table 1

Comparison of basic parameters.

SchemeSecLev

KSW12 ‎[15]selectively
LL18 ‎[31]selectively
Our proposaladaptively

Let denote the length of the public key including public parameters, let denote the length of the search token (in some schemes, i.e., the private key), let denote the length of the ciphertext, and let SecLev denote the security level. Let and denote the length of the element in groups and , respectively, let denote the length of the element in the field , and let denote the dimension of the ciphertext attribute and the key attribute.