Table 2 Comparison of computational costs.
From: A compact public key encryption with equality test for lattice in cloud computing
Scheme | Encrypt | Decrypt | Test |
|---|---|---|---|
Duong et al.24 | \(4T_{\delta } + {8}T_{A} + ({6 + 2}l)T_{M} + T_{H}\) | \(2(T_{SL} + T_{A} + T_{M} )\) | \({2}\left( {T_{SL} + T_{A} + T_{M} } \right)\) |
Roy et al.26 | \(4T_{\delta } + {8}T_{A} + {6}T_{M} + T_{H}\) | \(2(T_{SL} + T_{A} + T_{M} )\) | \({2}\left( {T_{SL} + T_{A} + T_{M} } \right)\) |
Xiao et al.27 | \({2}\left( {{3}T_{\delta } + {4}T_{A} + {5}T_{M} + T_{H} } \right)\) | \(2(T_{SD} + T_{A} + T_{M} )\) | \(2(T_{SD} + T_{A} + T_{M} )\) |
Ours | \(2T_{\delta } + {4}T_{A} + 3T_{M}\) | \(T_{SL} + T_{A} + T_{M}\) | \({2}\left( {T_{SL} + T_{H} + {3}T_{M} } \right)\) |