Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Table 4

Comparison of central authority, security model, and type and length of ciphertext.

SchemeCentral authoritySecurity modelPrevent decryption by individual authoritiesKP/CP-ABELength of ciphertext

Chase’s [31]YSelective-setNKP-ABE
Liu et al.’s [36]MultipleFull-securityYCP-ABE
Lin et al.’s [32]NSelective-setYFIBE
Chase and Chow [34]NSelective-setYKP-ABE
Lekwo and Waters [35]NFull-securityPartiallyCP-ABE
Han et al.’s [37]NSelective-setYKP-ABE