Skip to main content

Table 1 General analysis of our scheme

From: Verifiable image revision from chameleon hashes

Algorithm Computation cost Communication cost
OrigAuth \(m \cdot P + (2m+1) \cdot E\) \(l+n\cdot Q + le\)
Edit \(2m \cdot P + (3m+1) \cdot E\) \(l+n\cdot Q + le\)
Verify \(m \cdot P + (2m+1) \cdot E\) \(-\)