Research Article
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
Table 1
Computation time (in ms).
| Client | t = 3 | t = 4 | t = 5 | t = 6 |
| Time of secret verification | 791.52 | 868.21 | 1103.42 | 7370.42 | Time of secret reconstruction | 2.17 | 2.19 | 2.31 | 2.74 |
|
|