Skip to main content

Table 1 General analysis of our scheme

From: Verifiable image revision from chameleon hashes

Algorithm

Computation cost

Communication cost

OrigAuth

\(m \cdot P + (2m+1) \cdot E\)

\(l+n\cdot Q + le\)

Edit

\(2m \cdot P + (3m+1) \cdot E\)

\(l+n\cdot Q + le\)

Verify

\(m \cdot P + (2m+1) \cdot E\)

\(-\)