Research Article
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
Table 1
Comparison of different schemes.
| | Hur’s [8] | Lai et al.’s [9] | Lai et al.’s [10] | The proposed scheme |
| Ciphertext size | | | | | Private key size | | | | | Public key size | | | | | Encryption cost | | | | | Partial decryption cost (storage server or proxy server) | | / | / | | Partial decryption cost (SDS monitor) | / | / | / | | Decryption cost (user) | | | | | Token generation cost (user) | | / | / | |
|
|