Table 6.
Computation time consumption.
| Description | Time (ms) |
|---|---|
| Identity-based signature | 23.866 |
| Identity-based signature verification | 5.8720 |
| Asymmetric signature | 3.8500 |
| Asymmetric signature verification | 0.1925 |
| Public-key-based encryption | 3.8500 |
| Public key-based decryption | 3.8500 |
| symmetrical encryption | 0.0046 |
| Symmetric decryption | 0.0046 |
| Scalar multiplication in | 0.4420 |
| Scalar multiplication | 20.2300 |
| ECS scalar multiplication | 1.9700 |
| Exponentiation Operations | 1.2950 |
| Bilinear pairing | 4.2110 |
| Map-to-point hash function | 4.4060 |
| Fuzzy extractor | 0.0023 |
| 0.0023 | |
| 12.4180 | |
| 0.9740 | |
| 0.0046 |