Research Article
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes
Table 3
The comparison of time complexity.
| ā | Reference [16] | Reference [17] | Ours |
| Encryption | | | | Decryption | | | |
|
|
: the maximum number of system attributes in [ 16, 17]. According to [ 19, 27], let and . |