Table 4 The cost of generating private keys and cipher-text for four algorithms.
Method | Private key length | Cipher-text length | Computation cost | |
|---|---|---|---|---|
Private key generation | Cipher-text generation | |||
BTA-AHEA | 2 + \(\left| S \right|\) | 3 + \(\left| h \right|\) | (4 + \(\left| S \right|\))\(J_{e}\) + \(J_{m}\) | (3 + \(\left| {h \times r} \right|\))\(J_{p}\) + (1 + \(\left| {h \times r} \right|\))\(J_{m}\) |
FHE | 3 + \(\left| S \right|\) | 3 + 2 \(\left| h \right|\) | (5 + 5 \(\left| S \right|\))\(J_{e}\) + (1 + 2 \(\left| S \right|\))\(J_{m}\) | (5 + 3\(\left| h \right|\))\(J_{e}\) + (1 + 3 \(\left| h \right|\))\(J_{m}\) |
HE | 3 + 2 \(\left| S \right|\) | 4 + 3 \(\left| h \right|\) | (5 + 7 \(\left| S \right|\))\(J_{e}\) + (3 + \(\left| S \right|\))\(J_{m}\) | (5 + 2 \(\left| {h + r} \right|\)+ 6 \(\left| h \right|\))\(J_{e}\) + (2 + \(\left| {h + r} \right|\)+ 3 \(\left| h \right|\))\(J_{m}\) |
ABE | 2 + 3\(\left| S \right|\) | 3 + 3 \(\left| h \right|\) | (4 + 4 \(\left| S \right|\))\(J_{e}\) + \(\left| S \right|\)\(J_{m}\) | (4 + 3 \(\left| h \right|\))\(J_{e}\) + (2 + 3 \(\left| h \right|\))\(J_{m}\) |