From: Enabling efficient traceable and revocable time-based data sharing in smart city
Scheme | User traceability | User revocability | Backward security | Forward security | Time-based access control | Efficient decryption |
---|---|---|---|---|---|---|
Scheme [12] | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\times\) |
Scheme [48] | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) |
Scheme [46] | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) |
Scheme [6] | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\times\) |
Scheme [21] | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) |
Our scheme | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |