Advances, Systems and Applications
Schemes | [24] | [28] | [29] | Ours |
---|---|---|---|---|
Ciphertext size | \(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\) | \(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\) | \(\left( 2n_{1} +1 \right) \left| G \right| +\left| G_{T} \right|\) | \(\left( n_{1} +3 \right) \left| G \right| +\left| G_{T} \right|\) |
Index size | \(-\) | \(\left( n_{1} +2 \right) \left| G \right| +\left| G_{T} \right|\) | \(-\) | \(3\left| G \right|\) |
Private key size | \(\left( 2n_{2} +1 \right) \left| G \right|\) | \(\left( 3n_{2} +4 \right) \left| G \right|\) | \(\left( 2n_{2} +2 \right) \left| G \right|\) | \(\left( 2n_{2} +2 \right) \left| G \right|\) |
Token size | \(-\) | \(2\left| G \right|\) | \(\left( 2n_{2} +1 \right) \left| G \right|\) | \(3\left| G \right| +\left| G_{T} \right|\) |
Attribute revocation | \(-\) | \(3n_{3} \left| G \right|\) | \(2n_{3} \left| G \right|\) | \(3n_{3} \left| G \right|\) |