Research Article
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
Table 3
Property of each scheme.
| ā | Outsourcing | Verifiability | Constant ciphertext length |
| LCL 13 [11] | Yes | No | No | LDG 13 [31] | Yes | Yes | No | GHW 11 [12] | Yes | No | No | Our scheme | Yes | Yes | Yes |
|
|