Research Article
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
Table 1
Comparison of different schemes.
| | ā | Enc. | Dec. | Ciphertext length | Assumption |
| | Constant-sized ciphertexts [23] | | | | -DBDH | | Hidden policy [25] | | | | DBDH | | Traceability [26] | | | | -BDHI | | Proposed | | | | -BDHE |
|
|