Research Article
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
Table 2
Comparison of computing overhead.
| Scheme | Offline encryption | Online encryption | Outsourced decryption | Local decryption |
| Zhang et al. [9] | ā | | ā | | Li [11] | | | ā | | Wang et al. [24] | | | | | Ours | | | | |
|
|