Skip to main content

Advances, Systems and Applications

Table 2 Efficiency and performance comparison

From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing

Scheme

Access method

Traceability

With untrusted AA

Computation cost

[14]

LSSS

Yes

No

(n + 3) paring

[9]

Threshold

No

No

4 paring

[18]

Threshold

No

No

(n + 4) paring

Our scheme

Access tree

Yes

Yes

(n + 1) paring