Research Article

Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT

Table 1

Properties comparison.

SchemeAccess structureConstant-size ciphertextConstant-size private keyOutsourced decryptionSecurityBilinear group

[23]Strict AND-gate PolicySelectively IND-CPA securePrime order
[20]ThresholdSelectively IND-CPA securePrime order
[21]ThresholdSelectively IND-CPA securePrime order
[16]Access treeSelectively IND-CPA securePrime order
[17]Linear secret sharing schemes (LSSS) [40]Selectively IND-CPA-securePrime order
[18]LSSSSelectively IND-CPA securePrime order
[41]LSSSFully (adaptively) IND-CPA secureComposite order
[26]AND-gate policy with wildcardsSelectively IND-CPA securePrime order
[27]AND-gate policy with wildcardsFully (adaptively) IND-CPA secureComposite order
[19]Tolerant AND-gate Policy based on bits stringSelectively IND-CCA securePrime order
[31]LSSS(not privacy-preserving)Selectively IND-CPA securePrime order
[34]LSSS(not privacy-preserving)Selectively IND-CPA securePrime order
[33]LSSS(not privacy-preserving)Selectively IND-CPA securePrime order
[29]Tolerant AND-gate policy based on bits stringSelectively IND-CPA securePrime order
[25]Strict AND-gate policySelectively IND-CPA securePrime order
[22]ThresholdSelectively IND-CCA2 securePrime order
[24]Strict AND-gate policySelectively IND-CPA securePrime order
[28]AND-gate policy with wildcardsSelectively IND-CPA securePrime order
OursTolerant AND-gate policy based on bits string(privacy-preserving)Selectively IND-CCA securePrime order