Schemes | Access policy | Policy hidden | Ciphertext size | Decryption time | Decryption outsourced |
---|---|---|---|---|---|
Nishide et al. [6] | AND-gates on multi-values | Partially hidden | Linear | Deterministic and lineara | No |
Li et al. [24] | AND-gates on multi-values | Partially hidden | Linear | Deterministic and linear | No |
Lai et al. [25] | AND-gates on multi-values | Partially hidden | Linear | Deterministic and linear | No |
Zhang et al. [26] | AND-gates on multi-values | Partially hidden | Linear | Deterministic and linear | No |
Lai et al. [27] | LSSS | Partially hidden | Linear | Opportunistic and linearc | No |
Cui et al. [28] | LSSS | Partially hidden | Linear | Opportunistic and linear | No |
Lweko et al. [18] | Inner product predicates | Fully hidden | Super-polynomial | Opportunistic and linear | No |
Michalevsky et al. [29] | Inner product predicates | Fully hidden | Super-polynomial | Opportunistic and linear | No |
Khan et al. [30] | LSSS with hidden vectors | Fully hidden | Super-polynomial | Opportunistic and linear | No |
Ours | Tree-based structure | Public policy is exposed and secret policy is fully hidden | Linear | Deterministic and constantb | Yes |