Skip to main content
. 2020 Aug 31;20(17):4934. doi: 10.3390/s20174934

Table 4.

Comparing the computation amount of this proposed scheme with existing CP-ABE schemes.

Hahn Scheme
[13]
Jiang
Scheme [12]
Yu
Scheme [22]
Qi Li
Scheme [5]
Encryption ce+(n+4)M ce+M+(n+1)E 2ce+(n+3)M
+(4n+6)E
ce+(4n+5)E+(2n+2)M
+2H+1Enc
Partial decryption (server) 2ce+3E+2nM - - 4nce+(2n+3)M+nE
Final decryption (user) (2n+3)ce+(2n+3)M 2nce+(n+1)M (2n+3)ce+(2n+3)M+(2n+1)E E+M+H+1Dec
Message verification - - - 2H
Premkamal
Scheme [17]
Jiguo Li
Scheme [18]
Proposed Scheme
Encryption 2(n+1)ce+(2n+1)E
+H+M+1Enc
2ce+2(n+1)M
+2(n+4)E+2H
ce+(n+1)M+(n+5)E
+2H+1Enc
Partial decryption
(server)
(n+3)ce+nE 4ce+2M 2ce+nM+2E
Final decryption
(user)
1Dec 2H+4E+4M ce+2M+2H+1Dec
Message verification E+3M+H 2H+2E+2M 2H
ce: Pairing operation; M: Multiplication operation; n: Number of attributes; E: Exponentiation operation;
H: Hash function Enc: Symmetric key encryption; Dec: Symmetric key decryption