Research Article
Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
Table 2
Comparison of the computation efficiency.
| ||||||||||||||||||||||||||||||||||||||||||||||||||
: computation time of modular multiplication operation; : computation time of ECC multiplication operation; : computation time of ECC point add operation; : computation time of exponent operation; : computation time of bilinear pairing operation. |