Research Article
Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
Table 5
Communication overhead of attribute revocation.
| ||||||||||||||||||||||||||||||
Notes. is the number of ciphertexts which is associated with the revoked attribute . is the number of unrevoked accessors. is the length of each update parameter. |