Research Article
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
Table 2
User-side computation cost comparison.
| Phase | CP-ABE-OED1 | CP-ABE-OED2 | [12] | [21] | [23] | [26] | [27] |
| KeyGen | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Encrypt | | | | | | | | Decrypt | | | | | | | |
|
|