Advances, Systems and Applications
From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing
Scheme
Access method
Traceability
With untrusted AA
Computation cost
[14]
LSSS
Yes
No
(n + 3) paring
[9]
Threshold
4 paring
[18]
(n + 4) paring
Our scheme
Access tree
(n + 1) paring