Advances, Systems and Applications
Schemes | Fine grained | Policy hiding | Attribute revocation | Keyword search | Proxy decrypt | Blockchain | Dynamic audit |
---|---|---|---|---|---|---|---|
[24] | \(\surd\) | \(\surd\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) |
[25] | \(\surd\) | \(\surd\) | \(\times\) | \(\times\) | \(\times\) | \(\surd\) | \(\times\) |
[28] | \(\surd\) | \(\times\) | \(\surd\) | \(\surd\) | \(\times\) | \(\times\) | \(\times\) |
[29] | \(\surd\) | \(\times\) | \(\surd\) | \(\surd\) | \(\times\) | \(\times\) | \(\times\) |
[31] | \(\surd\) | \(\surd\) | \(\times\) | \(\surd\) | \(\times\) | \(\times\) | \(\times\) |
[32] | \(\surd\) | \(\times\) | \(\surd\) | \(\surd\) | \(\surd\) | \(\surd\) | \(\times\) |
Ours | \(\surd\) | \(\surd\) | \(\surd\) | \(\surd\) | \(\surd\) | \(\surd\) | \(\surd\) |