Research Article
An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments
Table 1
Comparison of KP-ABE schemes.
| KP-ABE scheme | Ciphertext search | Key escrow problem | Ciphertext size |
| Yin et al. scheme [7] | Provided | Possible to occur | Proportional to the number of attributes | Ameri et al. scheme [8] | Not considered (possible to occur) | Li et al. scheme [9] | Meng et al. scheme [10] | Constant-size ciphertext | Longo et al. scheme [13] | Not provided | Key escrow problem solved (multi authority) | Leyou Zhang et al. scheme [14] | Key escrow problem solved (decentralized authority) | Proportional to the number of attributes | Kai Zhang et al. scheme [30] | Not considered (possible to occur) | Constant-size ciphertext | Belguith et al. scheme [31] | Goal of the proposal scheme | Provided (fast ciphertext search) | Key escrow problem solved (single authority) | Constant-size ciphertext |
|
|