Research Article
[Retracted] A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT
Table 2
Performance comparison between our scheme and Zhou et al.’s scheme.
| ||||||||||||||||||||||||||||||
Notations: : number of classes in the access graph . : number of users in the access graph . : computation cost for decryption of a public key encryption scheme. : computation cost of n-multilinear map. : computation cost of modular exponent. : computation cost of XOR operator. : computation cost of hash function. |