Research Article

Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes

Table 3

The comparison of time complexity.

ā€‰Reference [16]Reference [17]Ours

Encryption
Decryption

: the maximum number of system attributes in [16, 17]. According to [19, 27], let and .