Research Article
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
Table 4
User-side communication cost comparison.
| Phase | KeyGen | Encrypt | Decrypt |
| Link | TA => Bob/Alice | Bob => CSP | ABE Service => Bob | Bob => ABE Service | CSP => Alice | ABE Service => Alice | Alice => ABE Service | CP-ABE-OED1 | | 0 | 0 | | 0 | | 0 | CP-ABE-OED2 | | 0 | 0 | | 0 | | 0 | [12] | | | 0 | 0 | 0 | | | [21] | | | 0 | 0 | | | | [23] | | 0 | 0 | | 0 | | | [26] | | | | 0 | 0 | | | [27] | | 0 | 0 | | 0 | | |
|
|