Research Article
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
Table 2
Comparison of evaluation indicators for ABE.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1, elliptic curve type; 2, access structure; 3, attribute coverage: large attribute universe; 4, multiuser; 5, speech encryption; 6, speech application scenarios; 7, user private key size; 8, ciphertext size. |