Research Article

Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing

Table 2

Comparison of the computation efficiency.

EncRe-key-genRe-encDec-2

Wang and Yang [41]
Maiti and Misra [37]
Sun et al. [38]
Yin et al. [39]
Chunpeng et al. [40]
Proposed scheme

: computation time of modular multiplication operation; : computation time of ECC multiplication operation; : computation time of ECC point add operation; : computation time of exponent operation; : computation time of bilinear pairing operation.