Research Article

Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs

Table 1

Functional analysis comparison.

FeaturesMRSE [20]Sun [24]Yang [23]Li[25]This scheme

Access control××
Multiple keywords
Semantic extension×××
Relevance ranking×
Multi-user××