From: An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
Traceability
Supporting monotone access structures
Key delegation
Cipher delegation
Reference [11]
√
×
Reference [14]
Reference [26]
Reference [27]
Reference [28]
Reference [29]
Our work