From: An efficient attribute-based hierarchical data access control scheme in cloud computing
Scheme | CP-ABE [6] | FH-CP-ABE [8] | LS-CP-ABE [7] | AHAC-CP-ABE |
---|---|---|---|---|
Setup time | \( 2E_{0} + E_{T} { + }P \) | \( 2E_{0} + E_{T} + P \) | \( 2E_{0} + E_{T} + P \) | \( 2E_{0} + E_{T} + P \) |
Private key generation time | \( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \) | \( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \) | \( (2 + \omega )E_{0} + M \) | \( (2 + \omega )E_{0} + M \) |
Encryption time | \( \begin{aligned} (2c + 1)nE_{0} + \hfill \\ nE_{T} + nM \hfill \\ \end{aligned} \) | \( \begin{aligned} (2c + n) \cdot \hfill \\ (E_{0} + E_{T} + M) \hfill \\ \end{aligned} \) | \( \begin{aligned} (3c + 1)nE_{0} + \hfill \\ nE_{T} + (c + 1)nM \hfill \\ \end{aligned} \) | \( \begin{aligned} (3c + n)E_{0} + \hfill \\ nE_{T} + (n + c)M \hfill \\ \end{aligned} \) |
Decryption time | \( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \) | \( \begin{aligned} cE_{T} + nM + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \) | \( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \) | \( \begin{aligned} cE_{T} + M + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \) |
Private key storage | \( (2\omega + 1)l_{0} \) | \( (2\omega + 1)l_{0} \) | \( (2 + \omega )l_{0} \) | \( (2 + \omega )l_{0} \) |
Ciphertext storage | \( (2c + 1)nl_{0} + nl_{T} \) | \( \begin{aligned} (2c + n)l_{0} + \hfill \\ (n + c)l_{T} \hfill \\ \end{aligned} \) | \( (2c + 1)nl_{0} + nl_{T} \) | \( (2c + n)l_{0} + nl_{T} \) |