Table 4 Encryption and decryption time of our scheme.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
Scheme | Original data | Ciphertext address | Attribute update | Ciphertext verification | Ciphertext decryption |
|---|---|---|---|---|---|
The number of attributes | \(\text {10}\) | \(\text {20}\) | \(\text {30}\) | \(\text {40}\) | \(\text {50}\) |
Encryption time (ms) | \(\text {80.0}\) | \(\text {140.0}\) | \(\text {190.0}\) | \(\text {230.0}\) | \(\text {275.0}\) |
Decryption time-Cloud (ms) | \(\text {62.5}\) | \(\text {95.5}\) | \(\text {130.5}\) | \(\text {170.0}\) | \(\text {210.0}\) |
Decryption time-User (ms) | \(\text {0}\) | \(\text {0}\) | \(\text {0}\) | \(\text {0}\) | \(\text {0}\) |