Research Article
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT
Table 3
is the number of attributes involved in the access tree in question, is the number of a data user’s attributes, and is the size of sets (here we assume that both sets have the same size ).
|