From: Rainbow: reliable personally identifiable information retrieval across multi-cloud
Scheme | User revocation | Security | Full verifiability | User decryption computation | ||
---|---|---|---|---|---|---|
Immediateness | Reliability | Trust on cloud server | Model of attack | |||
Attrapadung and Imai (2009) | \(\checkmark\) | \(\times\) | – | Selective | \(\times\) | \(3|I|E+4|I|P\) |
Cui et al. (2016) | \(\times\) | \(\times\) | Untrust | Selective | \(\times\) | \(1E'\) |
Qin et al. (2017) | \(\times\) | \(\times\) | Untrust | Selective | \(\times\) | 2P |
Ma et al. (2015) | – | - | Covert | Selective | \(\Delta\) | \(1E'\) |
Ma et al. (2019) | \(\checkmark\) | \(\times\) | Semi-honest | Selective | \(\times\) | \(1E'\) |
Yang et al. (2015) | \(\checkmark\) | \(\times\) | Semi-honest | Adaptive | \(\times\) | \(1E'\) |
Our ROABE | \(\checkmark\) | \(\checkmark\) | Covert | Adaptive | \(\checkmark\) | \(1E'\) |