Table 2 Comparison of computational costs.

From: A compact public key encryption with equality test for lattice in cloud computing

Scheme

Encrypt

Decrypt

Test

Duong et al.24

\(4T_{\delta } + {8}T_{A} + ({6 + 2}l)T_{M} + T_{H}\)

\(2(T_{SL} + T_{A} + T_{M} )\)

\({2}\left( {T_{SL} + T_{A} + T_{M} } \right)\)

Roy et al.26

\(4T_{\delta } + {8}T_{A} + {6}T_{M} + T_{H}\)

\(2(T_{SL} + T_{A} + T_{M} )\)

\({2}\left( {T_{SL} + T_{A} + T_{M} } \right)\)

Xiao et al.27

\({2}\left( {{3}T_{\delta } + {4}T_{A} + {5}T_{M} + T_{H} } \right)\)

\(2(T_{SD} + T_{A} + T_{M} )\)

\(2(T_{SD} + T_{A} + T_{M} )\)

Ours

\(2T_{\delta } + {4}T_{A} + 3T_{M}\)

\(T_{SL} + T_{A} + T_{M}\)

\({2}\left( {T_{SL} + T_{H} + {3}T_{M} } \right)\)