Research Article
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT
Table 4
Computational complexity comparison.
| Scheme | AttrKeyGen | Encrypt | Online decryption (by proxy server) | Blind KeyGen (by user)/offline decryption (by user) |
| [20] | | | | / | [21] | | | | / | [23] | | | | / | [24] | | | | / | [26] | | | | / | [34] | | | | / | [19] | | | | / | [29] | | | | / | Ours | | | | / |
|
|