Research Article

CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy

Table 1

Comparison of different schemes.

Hur’s [8]Lai et al.’s [9]Lai et al.’s [10]The proposed scheme

Ciphertext size
Private key size
Public key size
Encryption cost
Partial decryption cost (storage server or proxy server)//
Partial decryption cost (SDS monitor)///
Decryption cost (user)
Token generation cost (user)//