Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 2 Efficiency and performance comparison

From: An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing

Scheme Access method Traceability With untrusted AA Computation cost
[14] LSSS Yes No (n + 3) paring
[9] Threshold No No 4 paring
[18] Threshold No No (n + 4) paring
Our scheme Access tree Yes Yes (n + 1) paring