Research Article
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
Table 1
Functional analysis comparison.
| | Features | MRSE [20] | Sun [24] | Yang [23] | Li[25] | This scheme |
| | Access control | × | ✓ | × | ✓ | ✓ | | Multiple keywords | ✓ | ✓ | ✓ | ✓ | ✓ | | Semantic extension | × | × | ✓ | × | ✓ | | Relevance ranking | ✓ | × | ✓ | ✓ | ✓ | | Multi-user | × | ✓ | × | ✓ | ✓ |
|
|