Research Article

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things

Table 2

Comparison of computing overhead.

SchemeOffline encryptionOnline encryptionOutsourced decryptionLocal decryption

Zhang et al. [9]ā€”ā€”
Li [11]ā€”
Wang et al. [24]
Ours