Skip to main content

Table 1 Key Size, Ciphertext Size and Computation Amount

From: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

 

Yu etal’s scheme [ 3 ]

Hur et al’s scheme [ 4 ]

The proposed scheme

PK

\( \begin{array}{l}\left(3\left|U\right|+1\right)\\ {}\times \left|G\right|+\left|{G}_T\right|\end{array} \)

2 × |G| + |G T |

\( \begin{array}{l}\left(2\left|U\right|+2\right)\\ {}\times \left|G\right|+\left|{G}_T\right|\end{array} \)

SK

(2|U| + 1) × |G|

\( \begin{array}{l}\left(2\left|S\right|\kern0.5em +1\right)\times \left|G\right|\\ {}+ \log \kern0.5em \left|N\right|\times \left|K\right|\end{array} \)

(|S| + 2) × |G|

CT

\( \begin{array}{l}\left(\left|U\right|+1\right)\\ {}+\left|G\right|+\left|{G}_T\right|\end{array} \)

\( \begin{array}{l}\left(2\left|I\right|+1\right)\\ {}\times \left|G\right|+\left|{G}_T\right|\end{array} \)

\( \begin{array}{l}\left(2\left|I\right|+1\right)\\ {}\times \left|G\right|+\left|{G}_T\right|\end{array} \)

RK

r|U| × |Z p |

(2|N| − 1) × |K|

r|U| × |X p |

Enc

(|U| + 2) × exp

(2|I| + 2) × exp

(2|I| + 2) × exp

Ext

(2|U| + 1) × exp

(2|S| + 2) × exp

(|S| + 2) × exp

Re-enc

|R CT | × exp

|R CT | × exp

|R CT | × exp

Re-key

|R SK | × exp

|R SK | × exp

|R SK | × exp

Dec

\( \begin{array}{l}\left(\left|U\right|+1\right)\times \widehat{e}\\ {}+\left(\left|U\right|1\right)\kern0.5em \times \kern0.5em exp\end{array} \)

\( \begin{array}{l}\left(2\left|R\right|+1\right)\times \widehat{e}\\ {}+\left(2\left|R\right|+2\right)\times exp\end{array} \)

\( \begin{array}{l}\left(2\left|R\right|+1\right)\times \kern0.5em \widehat{e}\\ {}+\left(2\left|R\right|+2\right)\times \kern0.5em exp\end{array} \)

  1. Exp:ex ponentiation in G, ê: bilinear pairing,
  2. |U|: the number of attributes defined in the system,
  3. |S|: the number of attributes in user’s key,
  4. |R| the number of user’s attributes satisfying an acces structure,
  5. r: the number of times the attribute revocation event occurs,
  6. |R SK |: the number of updated attributes (secret key),
  7. |R CT |: the numbet of updated attributes (ciphertext), |N|: the number of total user,
  8. |I|: the number of attributes am acces structure, |K|: size of the common key.