Research Article

Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption

Table 5

User-side storage cost comparison.

ā€‰CP-ABE-OED1CP-ABE-OED2[12][21][23][26][27]

Bob/Alice