Research Article
A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
Table 1
Comparisons of security properties.
| Characteristics | Scheme | SCSD | Reference [5] | Reference [6] |
| Key destruction | √ | √ | √ | Ciphertext destruction | √ | × | √ | Cryptanalysis attack resistance | √ | × | √ | Brute-force attack resistance | √ | × | √ | Sybil attack resistance | √ | × | × | Asymmetric encryption | √ | × | × | Fine-grained access control | √ | × | × | Simple key management | √ | × | × |
|
|