Research Article

A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update

Table 2

Efficiency comparison.

SchemePK sizeSK sizeCiphertext sizeDecryption time (of pairing)

[23]
[29]
Our

: the max number of attributes in the system, : number of elements, : number of elements, : the set of attributes created for a specific user, : the number of attributes involved in the encryption process, : the identity set defined in the system, : the max number of the revoked users, : the length of the revocation list, : the depth of the time tree, : best case , and worst case .