Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Table 4

Computation cost comparison of each phase in the different schemes.

AlgorithmsSHBLLWSGA1GA2Proposed

Setup
KeyGen
Encrypt
Decrypt1
RKGen1
REncrypt1
Decrypt2
RKGen2
REncrypt2