Skip to main content

Table 2 Comparison of Schemes

From: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

 

Yu etal’s scheme [ 3 ]

Hur et al’s scheme [ 4 ]

Liang et al’s scheme [ 5 ]

The proposed scheme

Suporting acces policy type

‘AND’

‘AND’, ‘OR’

Any LSSS

Any LSSS

Attibute level user revoction

Possible

Possible

Impossible

Possible

Grant attributes to users

The authority generates a new secret key

The authority generates a new secret key

The authority generates a new secret key

Cloud server adds attributes to user’s secret key