Skip to main content

Table 1 Compare of the performance of four algorithms

From: An efficient attribute-based hierarchical data access control scheme in cloud computing

Scheme

CP-ABE [6]

FH-CP-ABE [8]

LS-CP-ABE [7]

AHAC-CP-ABE

Setup time

\( 2E_{0} + E_{T} { + }P \)

\( 2E_{0} + E_{T} + P \)

\( 2E_{0} + E_{T} + P \)

\( 2E_{0} + E_{T} + P \)

Private key generation time

\( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \)

\( \begin{aligned} (2 + 2\omega )E_{0} + \hfill \\ (\omega + 1)M \hfill \\ \end{aligned} \)

\( (2 + \omega )E_{0} + M \)

\( (2 + \omega )E_{0} + M \)

Encryption time

\( \begin{aligned} (2c + 1)nE_{0} + \hfill \\ nE_{T} + nM \hfill \\ \end{aligned} \)

\( \begin{aligned} (2c + n) \cdot \hfill \\ (E_{0} + E_{T} + M) \hfill \\ \end{aligned} \)

\( \begin{aligned} (3c + 1)nE_{0} + \hfill \\ nE_{T} + (c + 1)nM \hfill \\ \end{aligned} \)

\( \begin{aligned} (3c + n)E_{0} + \hfill \\ nE_{T} + (n + c)M \hfill \\ \end{aligned} \)

Decryption time

\( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \)

\( \begin{aligned} cE_{T} + nM + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \)

\( \begin{aligned} cnE_{T} + nM + \hfill \\ (2c + 1)nP \hfill \\ \end{aligned} \)

\( \begin{aligned} cE_{T} + M + \hfill \\ (2c + 1)P \hfill \\ \end{aligned} \)

Private key storage

\( (2\omega + 1)l_{0} \)

\( (2\omega + 1)l_{0} \)

\( (2 + \omega )l_{0} \)

\( (2 + \omega )l_{0} \)

Ciphertext storage

\( (2c + 1)nl_{0} + nl_{T} \)

\( \begin{aligned} (2c + n)l_{0} + \hfill \\ (n + c)l_{T} \hfill \\ \end{aligned} \)

\( (2c + 1)nl_{0} + nl_{T} \)

\( (2c + n)l_{0} + nl_{T} \)