Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Table 5

Comparison of computing cost.

SchemesAuthority setupKeyGen Encryption Decryption

Chase’s [31]
Liu et al.’s [36]
Chase and Chow [34]
Lekwo and Waters [35]
Han et al.’s [37]