Skip to main content

Advances, Systems and Applications

Table 2 Functional comparison

From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

Schemes

Fine grained

Policy hiding

Attribute revocation

Keyword search

Proxy decrypt

Blockchain

Dynamic audit

[24]

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

[25]

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

\(\surd\)

\(\times\)

[28]

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

[29]

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

[31]

\(\surd\)

\(\surd\)

\(\times\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

[32]

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

Ours

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)