Table 2 RIBE schemes theoretically compare.

From: An efficient lattice-based integrated revocable identity-based encryption

Scheme

The size of \(\textsf{SK}\)

The size of \(\textsf{CT}\)

KGC’s periodic workload

En-DKER

LWE

Online

Offline

XYM1910

\(\alpha\)

O(1)

\(\beta\)

\(\times\)

\(\times\)

QZZ+1911

O(1)

O(1)

\(\beta\)

\(\times\)

\(\times\)

WHL+2312

\(\alpha\)

\(\beta\)

\(\approx\) 0

\(\surd\)

\(\surd\)

CLL+1221

\(\alpha\)

O(1)

\(\beta\)

\(\times\)

\(\surd\)

KMT1922

\(\alpha\)

O(1)

\(\beta\)

\(\times\)

\(\surd\)

WZH+1925

\(\alpha\)

O(1)

\(\beta\)

\(\times\)

\(\surd\)

TW2127

\(\alpha\)

O(1)

\(\beta\)

\(\times\)

\(\surd\)

YXY2345

O(1)

O(1)

\(\beta\)

\(\times\)

\(\surd\)

Ours

O(1)

O(1)

\(\delta\)

\(\approx\) 0

\(\surd\)

\(\surd\)