Research Article
Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
Table 1
Comparison among previous MA CP-ABE schemes and ours.
| | Lin [15] | Muller [16] | Chase [17] | Lewko [14] | DACC [19] | Li [11] | Yang [18] | Ours |
| Flexible access policy | √ | √ | | √ | √ | | √ | √ | Resistance of accessor collusion | | √ | √ | √ | √ | √ | √ | √ | Without an authentication center | √ | | √ | √ | √ | √ | | √ | Authority independence | √ | √ | | √ | √ | √ | √ | √ | Efficient revocation | | | √ | — | | √ | √ | √ |
|
|