Table 4 The cost of generating private keys and cipher-text for four algorithms.

From: Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes

Method

Private key length

Cipher-text length

Computation cost

Private key generation

Cipher-text generation

BTA-AHEA

2 + \(\left| S \right|\)

3 + \(\left| h \right|\)

(4 + \(\left| S \right|\))\(J_{e}\) + \(J_{m}\)

(3 + \(\left| {h \times r} \right|\))\(J_{p}\) + (1 + \(\left| {h \times r} \right|\))\(J_{m}\)

FHE

3 + \(\left| S \right|\)

3 + 2 \(\left| h \right|\)

(5 + 5 \(\left| S \right|\))\(J_{e}\) + (1 + 2 \(\left| S \right|\))\(J_{m}\)

(5 + 3\(\left| h \right|\))\(J_{e}\) + (1 + 3 \(\left| h \right|\))\(J_{m}\)

HE

3 + 2 \(\left| S \right|\)

4 + 3 \(\left| h \right|\)

(5 + 7 \(\left| S \right|\))\(J_{e}\) + (3 + \(\left| S \right|\))\(J_{m}\)

(5 + 2 \(\left| {h + r} \right|\)+ 6 \(\left| h \right|\))\(J_{e}\)

 + (2 + \(\left| {h + r} \right|\)+ 3 \(\left| h \right|\))\(J_{m}\)

ABE

2 + 3\(\left| S \right|\)

3 + 3 \(\left| h \right|\)

(4 + 4 \(\left| S \right|\))\(J_{e}\) + \(\left| S \right|\)\(J_{m}\)

(4 + 3 \(\left| h \right|\))\(J_{e}\) + (2 + 3 \(\left| h \right|\))\(J_{m}\)