Research Article

Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT

Table 4

Storage cost comparison.

Scheme[11][13][14]Our scheme

Decryption key length
Outdec key lengthā€”
Ciphertext length