Research Article
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
| Scheme | [10] | [11] | [12] | [13] | [14] | [15] | Our scheme |
| Multiauthority | No | Yes | No | Yes | No | Yes | Yes | Access policy | AND gates | LSSS | LSSS | LSSS | LSSS | LSSS | LSSS | Fully hidden policy | No | No | No | No | No | Yes | Yes | Outdecryption | Yes | Yes | No | No | Yes | No | Yes | Security | RCCA | Selective RCPA | Selective CPA | Static security | Selective CPA | Selective CPA | Selective RCCA | Traceability | No | No | Yes | Yes | Yes | No | Yes |
|
|