Research Article
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
Table 2
Efficiency comparison.
| |||||||||||||||||||||||||||||||||||
: the max number of attributes in the system, : number of elements, : number of elements, : the set of attributes created for a specific user, : the number of attributes involved in the encryption process, : the identity set defined in the system, : the max number of the revoked users, : the length of the revocation list, : the depth of the time tree, : best case , and worst case . |