Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

Table 2

Computational times.

EncryptDecryptTransform

LCL 13 [11]None
LDG 13 [31]
GHW 11 [12]None
Our scheme