Research Article
An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments
Table 1
Comparison of KP-ABE schemes.
| | KP-ABE scheme | Ciphertext search | Key escrow problem | Ciphertext size |
| | Yin et al. scheme [7] | Provided | Possible to occur | Proportional to the number of attributes | | Ameri et al. scheme [8] | Not considered (possible to occur) | | Li et al. scheme [9] | | Meng et al. scheme [10] | Constant-size ciphertext | | Longo et al. scheme [13] | Not provided | Key escrow problem solved (multi authority) | | Leyou Zhang et al. scheme [14] | Key escrow problem solved (decentralized authority) | Proportional to the number of attributes | | Kai Zhang et al. scheme [30] | Not considered (possible to occur) | Constant-size ciphertext | | Belguith et al. scheme [31] | | Goal of the proposal scheme | Provided (fast ciphertext search) | Key escrow problem solved (single authority) | Constant-size ciphertext |
|
|