Research Article
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
Table 1
Efficiency comparisons with previous works.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
N: security parameter; λ: positive integer; r: number of nonrevoked users; ; ; ; ; ; ; or is the size of an element in the group G or ; p and e denote a pairing operation and an exponentiation operation, respectively; is the cost of executing an addition operation in ; is the cost of executing a multiplication operation in ; is the cost of executing the Samplepre algorithm in [23]; is the cost of executing a matrix inversion operation in ; is the cost of executing the Sampleleft algorithm in [27]; denotes that the workload of the authority performing the update procedure is independent of the number of nonrevoked users. |