Research Article
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
Table 1
Comparison of different schemes.
| ā | Enc. | Dec. | Ciphertext length | Assumption |
| Constant-sized ciphertexts [23] | | | | -DBDH | Hidden policy [25] | | | | DBDH | Traceability [26] | | | | -BDHI | Proposed | | | | -BDHE |
|
|