Skip to main content

Table 1 Performance comparison

From: An efficient and secure attribute based signcryption scheme with LSSS access structure

Schemes

Access control method

Signcryption computation cost

De-signcryption computation cost

Wang and Huang (2011)

Access tree

2 Exp + 1Pair

(1 + 2nlog n)Exp + (4n + 1)Pair

Hu and Zhang (2013)

Threshold

(2n + 5) Exp

2n Exp + (3n + 2)Pair

Our scheme

LSSS matrix

(5n + 2) Exp

(n + 1) Exp + (2n + 1)Pair