Research Article
Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
| System | Access structure | Hidden policy | Predetected decryption | Verifiable outsourcing | Integrity | Confidentiality | Blockchain technology |
| [36] | LSSS | √ | × | × | × | CPA | × | [30] | Access tree | √ | √ | √ | × | CPA | × | [34] | LSSS | √ | × | √ | √ | — | √ | [29] | LSSS | √ | × | √ | × | CPA | × | Ours | Access tree | √ | √ | √ | √ | CCA | √ |
|
|