Research Article
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
Table 3
Functionality comparison of the different PRE schemes.
| Functionalities | SHB | LLWS | GA | Proposed |
| Delegation | Yes | Yes | Yes | Yes | Delegation revocation | Yes | Yes | No | Yes | Conditional reservation delegation | No | No | Yes | Yes | Ciphertext update | Yes | Yes | No | Yes | Reauthorization | No | Yes | No | Yes | Detail analysis | No | No | No | Yes |
|
|