Research Article

An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT

Table 1

Notions for some basic operations.

SymbolsDefinition

Runtime for a scalar multiplication in
Runtime for a modular multiplication in
Runtime for a bilinear pairing
Runtime for a point addition in
Runtime for a map-to-point hash
The bit-size of a point in
The bit-size of a number in
The bit-size of
The bit-size of ciphertext
The bit-size of trapdoor