Research Article

Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices

Table 1

Efficiency comparisons with previous works.

[20][21][22][10][11]Ours

Signing key size
Signature size
Computation cost of signing
Computation cost of verifying
Authority’s workload

N: security parameter; λ: positive integer; r: number of nonrevoked users; ; ; ; ; ; ; or is the size of an element in the group G or ; p and e denote a pairing operation and an exponentiation operation, respectively; is the cost of executing an addition operation in ; is the cost of executing a multiplication operation in ; is the cost of executing the Samplepre algorithm in [23]; is the cost of executing a matrix inversion operation in ; is the cost of executing the Sampleleft algorithm in [27]; denotes that the workload of the authority performing the update procedure is independent of the number of nonrevoked users.