Table 2.
Comparison of size of keys and ciphertext in different CP-ABE schemes.
| Scheme | PK | MK | SK | Ciphertext |
|---|---|---|---|---|
| Cheung and Newport [14] | (3n + 1)L G1 + L G2 | (3n + 1)L Zq | (2n + 1)L G1 | (n + 1)L G1 + L G2 |
| Nishide et al.'s [15] | (2N′ + 1)L G1 + L G2 | (2N′ + 1)L Zq | (3n + 1)L G1 | (2N′ + 1)L G1 + L G2 |
| Emura et al.'s [16] | (N′ + 2)L G1 + L G2 | (N′ + 1)L Zq | 2L G1 | 2L G1 + L G2 |
| Bethencourt et al.'s [8] | 3L G1 + L G2 | L Zq + L G1 | (2|A U| + 1)L G1 | (2|A U| + 1)L G1 + L G2 |
| Ibraimi et al.'s [18] | (n + 1)L G1 + L G2 | (n + 1)L Zq | (|A U| + 1)L G1 | (|A U| + 1)L G1 + L G2 |
| Waters' [13] | (n + 2)L G1 + L G2 | L G1 | (|A U| + 2)L G1 | (2|A U| + 1)L G1 + L G2 |
| Lewko et al.'s [19] | (n + 2)L G1 + L G2 | L Zq + L G1 | (|A U| + 2)L G1 | (2|A U| + 1)L G1 + L G2 |