Research Article
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
Table 1
Comparison of performance.
| Scheme | Policy hidden | Composite order | Fully secure | Offline/online key generation | Offline/online encryption | Outsourced decryption | Verify |
| Zhang et al. [9] | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | Li [11] | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | Lewko and Waters [14] | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | Waters [22] | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | Liu et al. [23] | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | Wang et al. [24] | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | Ours | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|