Research Article

A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation

Table 1

Functional comparison.

SchemesRevocabilityTimeNumberCollusionCiphertext operability

[55]User and attribute×××
[46]User××
[48]User××
[47]Attribute××
[49]None××
[56]Attribute×××
Our schemeUser and attribute