Research Article

Privacy-Preserving Task Distribution Mechanism with Cloud-Edge IoT for the Mobile Crowdsensing

Table 2

Complexity comparisons.

SchemesABKS-SM [28]FGTAC [10]Scheme 1Scheme 2

F1
F2
F3
F4
F5
F62
F7
F8

Notations: F1: size of the user secret key; F2: computational cost for user secret key generation; F3: size of the ciphertext; F4: computational cost for encryption; F5: size of the trapdoor; F6: computational cost for trapdoor generation; F7: computational cost for keyword search; F8: computational cost for decryption; : number of attributes; : number of possible values for an attribute ; : number of data owners; : number of user’s attributes that satisfy the access policy; : an element in group ; : an element in group ; : a pairing operation; : an exponential operation over the group ; : an exponential operation over the group .