Research Article
Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research
Table 3
Comparison of computational methods.
| Scheme | DP-ABE | PAB-MSK | D-ABE | BC-SABE | STW-ABE |
| Encryption | | | | | | Index generation | — | | — | | | Token generation | — | | — | | | Search | — | | — | | | Decryption |
| | |
| Cloud:( + )P |
|
|