Skip to main content

Table 1 Computation cost of algorithms in our scheme

From: High efficient key-insulated attribute based encryption scheme without bilinear pairing operations

Algorithms

Setup

Initial private key generation

Encrypt

Decrypt

Key updating

Multiplication

n + 1

n

n + 3

2n

n

Addition

0

2n

1

2n

n

Hash 1

0

n

0

0

n

Hash 2

0

0

1

1

0