Review Article
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Table 5
Comparison of computing cost.
| Schemes | Authority setup | KeyGen | Encryption | Decryption |
| Chase’s [31] | | | | | Liu et al.’s [36] | | | | | Chase and Chow [34] | | | | | Lekwo and Waters [35] | | | | | Han et al.’s [37] | | | | |
|
|