|
| Scheme | Access structure | Constant-size ciphertext | Constant-size private key | Outsourced decryption | Security | Bilinear group |
|
| [23] | Strict AND-gate Policy | | | | Selectively IND-CPA secure | Prime order |
| [20] | Threshold | | | | Selectively IND-CPA secure | Prime order |
| [21] | Threshold | | | | Selectively IND-CPA secure | Prime order |
| [16] | Access tree | | | | Selectively IND-CPA secure | Prime order |
| [17] | Linear secret sharing schemes (LSSS) [40] | | | | Selectively IND-CPA-secure | Prime order |
| [18] | LSSS | | | | Selectively IND-CPA secure | Prime order |
| [41] | LSSS | | | | Fully (adaptively) IND-CPA secure | Composite order |
| [26] | AND-gate policy with wildcards | | | | Selectively IND-CPA secure | Prime order |
| [27] | AND-gate policy with wildcards | | | | Fully (adaptively) IND-CPA secure | Composite order |
| [19] | Tolerant AND-gate Policy based on bits string | | | | Selectively IND-CCA secure | Prime order |
| [31] | LSSS | | | (not privacy-preserving) | Selectively IND-CPA secure | Prime order |
| [34] | LSSS | | | (not privacy-preserving) | Selectively IND-CPA secure | Prime order |
| [33] | LSSS | | | (not privacy-preserving) | Selectively IND-CPA secure | Prime order |
| [29] | Tolerant AND-gate policy based on bits string | | | | Selectively IND-CPA secure | Prime order |
| [25] | Strict AND-gate policy | | | | Selectively IND-CPA secure | Prime order |
| [22] | Threshold | | | | Selectively IND-CCA2 secure | Prime order |
| [24] | Strict AND-gate policy | | | | Selectively IND-CPA secure | Prime order |
| [28] | AND-gate policy with wildcards | | | | Selectively IND-CPA secure | Prime order |
| Ours | Tolerant AND-gate policy based on bits string | | | (privacy-preserving) | Selectively IND-CCA secure | Prime order |
|