From: An efficient and secure attribute based signcryption scheme with LSSS access structure
Schemes | Access control method | Signcryption computation cost | De-signcryption computation cost |
---|---|---|---|
Wang and Huang (2011) | Access tree | 2 Exp + 1Pair | (1 + 2nlog n)Exp + (4n + 1)Pair |
Hu and Zhang (2013) | Threshold | (2n + 5) Exp | 2n Exp + (3n + 2)Pair |
Our scheme | LSSS matrix | (5n + 2) Exp | (n + 1) Exp + (2n + 1)Pair |