Review Article
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Table 4
Comparison of central authority, security model, and type and length of ciphertext.
| Scheme | Central authority | Security model | Prevent decryption by individual authorities | KP/CP-ABE | Length of ciphertext |
| Chase’s [31] | Y | Selective-set | N | KP-ABE | | Liu et al.’s [36] | Multiple | Full-security | Y | CP-ABE | | Lin et al.’s [32] | N | Selective-set | Y | FIBE | | Chase and Chow [34] | N | Selective-set | Y | KP-ABE | | Lekwo and Waters [35] | N | Full-security | Partially | CP-ABE | | Han et al.’s [37] | N | Selective-set | Y | KP-ABE | |
|
|