Research Article
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation
Table 1
Comparisons of the related attribute-based encryption schemes.
| Schemes | Online-Enc cost | Key-update cost | Ciphertext size | Update-key size | Rev |
| [5] | | | | | | [17] | | - | | - | √ | [32] | | - | | - | √ | [9] | | - | | - | × | Ours | | (14r-7)E | | | √ |
|
|