Research Article
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
Table 2
Comparison of computation time in terms of number of operations.
| Schemes | Updation of secret keys | Tag generation | Proof generation | Proof verification |
| Scheme (2016) | TH + 4Te + 2Tm | n (TH + 2Te + 2Tm) + Te | cTe + cTm | (c + 1)TH + 3Tp + (c + 2 + bl)Te+ 2Tm | Scheme (2017) | 2TH + 2Te + Tm | n (TH + 2Te + 2Tm) + Te | cTe + cTm | (c + 1)TH + 3Tp + (c + 2)Te + 2Tm | Scheme (2018) | Te | n (TH + 2Te + Tm) | cTe + cTm | cTH + 2Tp + (c + 3)Te + (c + 4)Tm | Proposed scheme | 2TH + Te + Tinv + 2Tm | n (2Te + Tm) + Te | (c + 1)Te + cTm | 2TH + 4Tp + 2Te |
|
|