Research Article
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT
Table 4
Computational complexity comparison.
| | Scheme | AttrKeyGen | Encrypt | Online decryption (by proxy server) | Blind KeyGen (by user)/offline decryption (by user) |
| | [20] | | | | / | | [21] | | | | / | | [23] | | | | / | | [24] | | | | / | | [26] | | | | / | | [34] | | | | / | | [19] | | | | / | | [29] | | | | / | | Ours | | | | / |
|
|