Review Article
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Table 1
Comparison of security proof and policy complexity in different CP-ABE schemes.
| Scheme | Access structure | Assumption | Model | Supported policy |
|
Cheung and Newport [14] | AND gate between two-value attributes | DBDH | Selective | And, non | Nishide et al.’s [15] | AND gate among multivalue attributes | DBDH, D-linear | Selective | And | Emura et al.’s [16] | AND gate among multivalue attributes | DBDH | Selective | And | Bethencourt et al.’s [8] | Tree without bound | Generic group | Adaptive | And, or, threshold | Ibraimi et al.’s [18] | Tree without bound | DBDH | Selective | And, or, threshold | Goyal et al.’s [12] | Bounded tree | DBDH | Selective | Bounded and, or, threshold | Liang et al.’s [17] | Bounded tree | DBDH | Selective | Bounded and, or, threshold | Waters’ [13] | LSSS matrix | DPBDHE | Selective | And, or, threshold | Lewko et al.’s [19] | LSSS matrix | 3P-SDP | Adaptive | And, or, threshold |
|
|