Research Article
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment
Table 1
Comparison of computational amount of each algorithm.
| ||||||||||||||||||||
time for a exponentiation operation; time for a multiplication operation; time for a bilinear pairing operation; time for a hash function operation; number of users. |