Research Article
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT
Table 1
Notions for some basic operations.
| Symbols | Definition |
| | Runtime for a scalar multiplication in | | Runtime for a modular multiplication in | | Runtime for a bilinear pairing | | Runtime for a point addition in | | Runtime for a map-to-point hash | | The bit-size of a point in | | The bit-size of a number in | | The bit-size of | | The bit-size of ciphertext | | The bit-size of trapdoor |
|
|