Table 4 Comparison of the running time of algorithms under different security levels.
From: A compact public key encryption with equality test for lattice in cloud computing
Security | Algorithm | Duong et al. | Roy et al. | Xiao et al. | Ours |
|---|---|---|---|---|---|
\(n = 64\) | Encrypt | 18.22 ms | 12.21 ms | 15.30 ms | 4.60 ms |
Decrypt | 3.70 ms | 3.73 ms | 6.72 ms | 1.85 ms | |
Test | 3.69 ms | 3.66 ms | 3.09 ms | 9.72 ms | |
\(n = 128\) | Encrypt | 86.65 ms | 57.84 ms | 72.35 ms | 21.72 ms |
Decrypt | 16.62 ms | 16.57 ms | 31.01 ms | 8.30 ms | |
Test | 16.60 ms | 16.63 ms | 14.51 ms | 45.41 ms | |
\(n = 256\) | Encrypt | 599.87 ms | 400.29 ms | 500.43 ms | 150.25 ms |
Decrypt | 113.52 ms | 113.50 ms | 213.48 ms | 56.74 ms | |
Test | 113.46 ms | 113.49 ms | 100.24 ms | 312.97 ms |