Skip to main content

Table 1 Comparison with other related works

From: An efficient traceable access control scheme with reliable key delegation in mobile cloud computing

 

Traceability

Supporting monotone access structures

Key delegation

Cipher delegation

Reference [11]

√

√

×

×

Reference [14]

×

√

√

×

Reference [26]

√

√

×

×

Reference [27]

√

√

×

×

Reference [28]

√

√

×

×

Reference [29]

√

√

×

×

Our work

√

√

√

√