Skip to main content

Table 2 Comparisons of Some CP-ABE Schemes

From: Rainbow: reliable personally identifiable information retrieval across multi-cloud

Scheme

User revocation

Security

Full verifiability

User decryption computation

Immediateness

Reliability

Trust on cloud server

Model of attack

Attrapadung and Imai (2009)

\(\checkmark\)

\(\times\)

Selective

\(\times\)

\(3|I|E+4|I|P\)

Cui et al. (2016)

\(\times\)

\(\times\)

Untrust

Selective

\(\times\)

\(1E'\)

Qin et al. (2017)

\(\times\)

\(\times\)

Untrust

Selective

\(\times\)

2P

Ma et al. (2015)

-

Covert

Selective

\(\Delta\)

\(1E'\)

Ma et al. (2019)

\(\checkmark\)

\(\times\)

Semi-honest

Selective

\(\times\)

\(1E'\)

Yang et al. (2015)

\(\checkmark\)

\(\times\)

Semi-honest

Adaptive

\(\times\)

\(1E'\)

Our ROABE

\(\checkmark\)

\(\checkmark\)

Covert

Adaptive

\(\checkmark\)

\(1E'\)

  1. “–” denotes “not applicable”. “\(\times\)” denotes “not support”, “\(\Delta\)” denotes “partially support” and “\(\checkmark\)” denote “fully support”. “|I|” are the cardinality of the satisfied attribute set. E, \(E'\), P are the numbers of modular exponentiations in \({\mathbb{G}}\) and \({\mathbb{G}}_{\text{T}}\), and paring, respectively