Research Article
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes
Table 1
The comparing of related schemes.
| Scheme | Access policy | Dimension m | Trapdoor size |
| Reference [8] | AND | | | Reference [15] | THRESHOLD | | | Reference [16] | AND, OR, and THRESHOLD | | | Ours | AND, OR, and THRESHOLD | | |
|
|