Research Article
Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
Table 2
Comparison of the computation efficiency.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
: computation time of modular multiplication operation; : computation time of ECC multiplication operation; : computation time of ECC point add operation; : computation time of exponent operation; : computation time of bilinear pairing operation. |