Research Article

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

Table 1

The comparison of computation cost.

Protocol (Encryption) (Decryption)

Protocol [4]
Our protocol