Research Article
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
Table 5
Comparison of the computation time (in ms) of each algorithm in different schemes.
| Algorithms | SHB | LLWS | GA1 | GA2 | Proposed |
| Setup | 6.474 | 376.159 | 12.801 | 13.113 | 13.025 | KeyGen | 6.467 | 71.027 | 21.669 | 22.01 | 22.146 | Encrypt | 21.056 | 33.701 | 21.019 | 21.327 | 21.033 | Decrypt1 | 19.552 | 39.174 | 13.121 | 13.255 | 13.009 | RKGen1 | 6.472 | — | 21.103 | 13.278 | 26.068 | REncrypt1 | 13.065 | — | 13.109 | 13.214 | 0.02 | Decrypt2 | 1.557 | 58.607 | 26.215 | 26.52 | 26.076 | RKGen2 | 0.005 | 59.323 | — | — | 34.592 | REncrypt2 | 6.453 | 26.089 | — | — | 0.011 |
|
|