Research Article

[Retracted] IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security

Table 3

Comparison of computational complexity.

Different stagesIBEAESDIOSIIBE

System initializationO (log N)O (log N)O (1)O (1)
Help device key updateO (log N)O (log N)O (1)O (1)
User key updateO (log N)O (log N)O (1)O (1)
Help device key refreshO (log N)O (log N)O (log N)O (1)
User key refreshO (log N)O (log N)O (log N)O (1)
EncryptionO (log N)O (log N)O (log N)O (log N)
DecodeO (log N)O (log N)O (log N)O (log N)