Research Article
[Retracted] IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Table 3
Comparison of computational complexity.
| Different stages | IBE | AES | DIOS | IIBE |
| System initialization | O (log N) | O (log N) | O (1) | O (1) | Help device key update | O (log N) | O (log N) | O (1) | O (1) | User key update | O (log N) | O (log N) | O (1) | O (1) | Help device key refresh | O (log N) | O (log N) | O (log N) | O (1) | User key refresh | O (log N) | O (log N) | O (log N) | O (1) | Encryption | O (log N) | O (log N) | O (log N) | O (log N) | Decode | O (log N) | O (log N) | O (log N) | O (log N) |
|
|