Research Article
A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption
Table 2
System function comparison of different schemes.
| Scheme | [28] | [24] | [23] | [20] | [19] | Ours |
| Support ciphertext conversion | × | √ | √ | √ | √ | √ | Collusion resistant | √ | √ | √ | √ | √ | √ | Decryption outsourcing | √ | √ | √ | × | × | √ | No KGC | √ | × | × | × | × | √ | User revocation | √ | × | × | √ | √ | √ | Decryption verification | × | √ | × | × | × | √ |
|
|