From: High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
Algorithms | Setup | Initial private key generation | Encrypt | Decrypt | Key updating |
---|---|---|---|---|---|
Multiplication | n + 1 | n | n + 3 | 2n | n |
Addition | 0 | 2n | 1 | 2n | n |
Hash 1 | 0 | n | 0 | 0 | n |
Hash 2 | 0 | 0 | 1 | 1 | 0 |