Table 2 Comparison of storage costs of four encryption algorithms.

From: Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes

Method

Public parameter size

Private key size

Cipher-text size

Storage cost

BTA-AHEA

12

4 + 2 \(\left| S \right|\)

\(\left| h \right|\)+ 1

0

FHE

8

7 + 3 \(\left| S \right|\)

\(\left| h \right|\)+ 4

None

HE

8

5 + 2 \(\left| S \right|\)

\(\left| h \right|\)+ 4

None

ABE

\(\left| l \right|\)+ 6

8 +  \(\left| S \right|\)

\(\left| h \right|\)+ 5

None

  1. “None” indicates that tracking malicious users is not supported.