Security and Communication Networks / 2019 / Article / Tab 1

Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Table 1

Computation time (in ms).

Clientt = 3t = 4t = 5t = 6

Time of secret verification791.52868.211103.427370.42
Time of secret reconstruction2.172.192.312.74

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.