Table 4 Encryption and decryption time of our scheme.

From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

Scheme

Original data

Ciphertext address

Attribute update

Ciphertext verification

Ciphertext decryption

The number of attributes

\(\text {10}\)

\(\text {20}\)

\(\text {30}\)

\(\text {40}\)

\(\text {50}\)

Encryption time (ms)

\(\text {80.0}\)

\(\text {140.0}\)

\(\text {190.0}\)

\(\text {230.0}\)

\(\text {275.0}\)

Decryption time-Cloud (ms)

\(\text {62.5}\)

\(\text {95.5}\)

\(\text {130.5}\)

\(\text {170.0}\)

\(\text {210.0}\)

Decryption time-User (ms)

\(\text {0}\)

\(\text {0}\)

\(\text {0}\)

\(\text {0}\)

\(\text {0}\)