Research Article

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

Table 2

Comparison of computation time in terms of number of operations.

SchemesUpdation of secret keysTag generationProof generationProof verification

Scheme (2016)TH + 4Te + 2Tmn (TH + 2Te + 2Tm) + TecTe + cTm(c + 1)TH + 3Tp + (c + 2 + bl)Te+ 2Tm
Scheme (2017)2TH + 2Te + Tmn (TH + 2Te + 2Tm) + TecTe + cTm(c + 1)TH + 3Tp + (c + 2)Te + 2Tm
Scheme (2018)Ten (TH + 2Te + Tm)cTe + cTmcTH + 2Tp + (c + 3)Te + (c + 4)Tm
Proposed scheme2TH + Te + Tinv + 2Tmn (2Te + Tm) + Te(c + 1)Te + cTm2TH + 4Tp + 2Te