Research Article

Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA

Table 2

Notation and time cost (at the transmission devices) of the cryptographic operations used in the comparative performance evaluation. In our proposal, it includes P256 ECC, AES CTR 256, and SHA256 [37, 38].

SymbolMeaningTime cost
Cryptool [40]Boneh–Goh–Nissim [21]Castagnos–Laguillaumie [22]Homomorphic identity-based method [23]Our proposal

TSigSignature creation2.88 ms0.969 ms0.924 ms0.629 ms0.918 ms
TVerOne signature verification8.53 ms14.339 ms27.974 ms27.349 ms26 ms
THashSHA-25615.8 cycles/byte5.174 μs/byte4.726 μs/byte
TEncTime for encryption18.2 cycles/byte0.828 ms0.756 ms1.098 ms99.82 μs/byte
TTOTAL_TDTotal time at TD1.7968 ms29.656 ms1.727 ms21.009 ms