Research Article

Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment

Table 1

Comparison of computational amount of each algorithm.

Encryption timeReencryption timeDelegated reencryption timeDecryption time


time for a exponentiation operation; time for a multiplication operation; time for a bilinear pairing operation; time for a hash function operation; number of users.