Research Article

Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation

Table 1

Comparisons of the related attribute-based encryption schemes.

SchemesOnline-Enc costKey-update costCiphertext sizeUpdate-key sizeRev

[5]
[17]--
[32]--
[9]--×
Ours(14r-7)E