Research Article
Privacy-Preserving Task Distribution Mechanism with Cloud-Edge IoT for the Mobile Crowdsensing
Table 2
Complexity comparisons.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Notations: F1: size of the user secret key; F2: computational cost for user secret key generation; F3: size of the ciphertext; F4: computational cost for encryption; F5: size of the trapdoor; F6: computational cost for trapdoor generation; F7: computational cost for keyword search; F8: computational cost for decryption; : number of attributes; : number of possible values for an attribute ; : number of data owners; : number of user’s attributes that satisfy the access policy; : an element in group ; : an element in group ; : a pairing operation; : an exponential operation over the group ; : an exponential operation over the group . |