Table 2 RIBE schemes theoretically compare.
From: An efficient lattice-based integrated revocable identity-based encryption
Scheme | The size of \(\textsf{SK}\) | The size of \(\textsf{CT}\) | KGC’s periodic workload | En-DKER | LWE | |
---|---|---|---|---|---|---|
Online | Offline | |||||
XYM1910 | \(\alpha\) | O(1) | – | \(\beta\) | \(\times\) | \(\times\) |
QZZ+1911 | O(1) | O(1) | – | \(\beta\) | \(\times\) | \(\times\) |
WHL+2312 | \(\alpha\) | \(\beta\) | – | \(\approx\) 0 | \(\surd\) | \(\surd\) |
CLL+1221 | \(\alpha\) | O(1) | – | \(\beta\) | \(\times\) | \(\surd\) |
KMT1922 | \(\alpha\) | O(1) | – | \(\beta\) | \(\times\) | \(\surd\) |
WZH+1925 | \(\alpha\) | O(1) | – | \(\beta\) | \(\times\) | \(\surd\) |
TW2127 | \(\alpha\) | O(1) | – | \(\beta\) | \(\times\) | \(\surd\) |
YXY2345 | O(1) | O(1) | – | \(\beta\) | \(\times\) | \(\surd\) |
Ours | O(1) | O(1) | \(\delta\) | \(\approx\) 0 | \(\surd\) | \(\surd\) |