Research Article

Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

Table 1

Function comparison.

Scheme[10][11][12][13][14][15]Our scheme

MultiauthorityNoYesNoYesNoYesYes
Access policyAND gatesLSSSLSSSLSSSLSSSLSSSLSSS
Fully hidden policyNoNoNoNoNoYesYes
OutdecryptionYesYesNoNoYesNoYes
SecurityRCCASelective RCPASelective CPAStatic securitySelective CPASelective CPASelective RCCA
TraceabilityNoNoYesYesYesNoYes