Research Article
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
Table 1
A comparison of various schemes.
| Schemes | Inside KGAs | Outside KGAs | ZC | ZT | TrC | TeC | CiC |
| [28] | NO | YES | | 2 | 2 | | | [17] | NO | NO | | | | | | [29] | YES | YES | 2 | | 2 | | 2 | [25] | NO | YES | | | | | | [27] | NO | YES | | 2 | | | | Ours | YES | YES | | | | | 3 |
|
|