Research Article

Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

Table 3

is the number of attributes involved in the access tree in question, is the number of a data user’s attributes, and is the size of sets (here we assume that both sets have the same size ).

SchemeKP-ABSI

KeyGen
Enc
TokenGen
SI