Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Table 1

Comparison of security proof and policy complexity in different CP-ABE schemes.

Scheme Access structureAssumptionModelSupported policy

Cheung and Newport [14]AND gate between two-value attributesDBDHSelectiveAnd, non
Nishide et al.’s [15] AND gate among multivalue attributesDBDH, D-linearSelectiveAnd
Emura et al.’s [16] AND gate among multivalue attributesDBDHSelective And
Bethencourt et al.’s [8]Tree without boundGeneric group Adaptive And, or, threshold
Ibraimi et al.’s [18]Tree without boundDBDHSelective And, or, threshold
Goyal et al.’s [12] Bounded treeDBDHSelective Bounded and, or, threshold
Liang et al.’s [17]Bounded treeDBDHSelective Bounded and, or, threshold
Waters’ [13]LSSS matrixDPBDHESelective And, or, threshold
Lewko et al.’s [19]LSSS matrix3P-SDPAdaptiveAnd, or, threshold