Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Table 6

Comparison of CP-A2BE, CP-A3BE, and AFKP-ABE.

SchemeTrace propertyTrace effectSender hidesAssumptionSupported policy

CP-A2BE [49]White boxAuthority, userNullDBDH, CDHAnd
CP-A3BE [50]Black boxUser Policy DBDH, D-linearAnd
AFKP-ABE [52]Black boxUser Part attributesDBDH, D-linearAnd, or, threshold