Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Table 5

Comparison of the computation time (in ms) of each algorithm in different schemes.

AlgorithmsSHBLLWSGA1GA2Proposed

Setup6.474376.15912.80113.11313.025
KeyGen6.46771.02721.66922.0122.146
Encrypt21.05633.70121.01921.32721.033
Decrypt119.55239.17413.12113.25513.009
RKGen16.47221.10313.27826.068
REncrypt113.06513.10913.2140.02
Decrypt21.55758.60726.21526.5226.076
RKGen20.00559.32334.592
REncrypt26.45326.0890.011