Research Article

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things

Table 1

Comparison of performance.

SchemePolicy hiddenComposite orderFully secureOffline/online key generationOffline/online encryptionOutsourced decryptionVerify

Zhang et al. [9]
Li [11]
Lewko and Waters [14]
Waters [22]
Liu et al. [23]
Wang et al. [24]
Ours