Skip to main content

Advances, Systems and Applications

Table 3 Communication cost comparison

From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

Schemes

[24]

[28]

[29]

Ours

Ciphertext size

\(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\)

\(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\)

\(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\)

\(\left( n_{1} +3 \right) \left| G \right| +\left| G_{T} \right|\)

Index size

\(-\)

\(\left( n_{1} +2 \right) \left| G \right| +\left| G_{T} \right|\)

\(-\)

\(3\left| G \right|\)

Private key size

\(\left( 2n_{2} +1 \right) \left| G \right|\)

\(\left( 3n_{2} +4 \right) \left| G \right|\)

\(\left( 2n_{2} +2 \right) \left| G \right|\)

\(\left( 2n_{2} +2 \right) \left| G \right|\)

Token size

\(-\)

\(2\left| G \right|\)

\(\left( 2n_{2} +1 \right) \left| G \right|\)

\(3\left| G \right| +\left| G_{T} \right|\)

Attribute revocation

\(-\)

\(3n_{3} \left| G \right|\)

\(2n_{3} \left| G \right|\)

\(3n_{3} \left| G \right|\)