Research Article

Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption

Table 1

Notations used in the performance results and analysis section.

NotationDefinition

Number of elements in
Number of rows in the LSSS access structure or number of leaf nodes in the access tree
An upper bound greater than of all the access policies
User’s set of attributes
Universe of attributes
Modular exponentiation in
Modular exponentiation in
Multiplication in
Multiplication in
Multiplication in
Hashing in
Hashing in
Element in
Element in
Element in