Table 5 Comparison of parameters’ size.

From: A compact public key encryption with equality test for lattice in cloud computing

Scheme

Public key

Secret key

Ciphertext

Duong et al.24

\(((l + 3)mn + nk)\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\(2m^{2} \left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\((4m + 2k)\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

Roy et al.26

\(4mn + nk\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\(2m^{2} \left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\((n^{2} + 4m + 2k)\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

Xiao et al.27

\(2mn\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\(2(m - nk^{\prime})nk^{\prime}\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\(2(m + k^{\prime})\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

Ours

\((3mn + nk)\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\(m^{2} \left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)

\((2m + 2k + 1)\left| {{\mathbf{\mathbb{Z}}}_{q} } \right|\)