Skip to main content

Table 1 Compare of the performance of four algorithms

From: An efficient attribute-based hierarchical data access control scheme in cloud computing

Scheme CP-ABE [6] FH-CP-ABE [8] LS-CP-ABE [7] AHAC-CP-ABE
Setup time \( 2E_{0} + E_{T} { + }P \) \( 2E_{0} + E_{T} + P \) \( 2E_{0} + E_{T} + P \) \( 2E_{0} + E_{T} + P \)
Private key generation time \( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \) \( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \) \( (2 + \omega )E_{0} + M \) \( (2 + \omega )E_{0} + M \)
Encryption time \( \begin{aligned} (2c + 1)nE_{0} + \hfill \\ nE_{T} + nM \hfill \\ \end{aligned} \) \( \begin{aligned} (2c + n) \cdot \hfill \\ (E_{0} + E_{T} + M) \hfill \\ \end{aligned} \) \( \begin{aligned} (3c + 1)nE_{0} + \hfill \\ nE_{T} + (c + 1)nM \hfill \\ \end{aligned} \) \( \begin{aligned} (3c + n)E_{0} + \hfill \\ nE_{T} + (n + c)M \hfill \\ \end{aligned} \)
Decryption time \( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \) \( \begin{aligned} cE_{T} + nM + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \) \( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \) \( \begin{aligned} cE_{T} + M + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \)
Private key storage \( (2\omega + 1)l_{0} \) \( (2\omega + 1)l_{0} \) \( (2 + \omega )l_{0} \) \( (2 + \omega )l_{0} \)
Ciphertext storage \( (2c + 1)nl_{0} + nl_{T} \) \( \begin{aligned} (2c + n)l_{0} + \hfill \\ (n + c)l_{T} \hfill \\ \end{aligned} \) \( (2c + 1)nl_{0} + nl_{T} \) \( (2c + n)l_{0} + nl_{T} \)