Research Article
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
Table 1
Notations used in the performance results and analysis section.
| Notation | Definition |
| | Number of elements in | | Number of rows in the LSSS access structure or number of leaf nodes in the access tree | | An upper bound greater than of all the access policies | | User’s set of attributes | | Universe of attributes | | Modular exponentiation in | | Modular exponentiation in | | Multiplication in | | Multiplication in | | Multiplication in | | Hashing in | | Hashing in | | Element in | | Element in | | Element in |
|
|