Research Article

Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT

Table 4

Computational complexity comparison.

SchemeAttrKeyGenEncryptOnline decryption (by proxy server)Blind KeyGen (by user)/offline decryption (by user)

[20]/
[21]/
[23]/
[24]/
[26]/
[34]/
[19]/
[29]/
Ours/