Table 3 Comparison of calculation costs for different schemes.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
Scheme | Original data | Ciphertext address | Attribute update | Ciphertext verification | Ciphertext decryption |
|---|---|---|---|---|---|
OUAC | \(\textit{2E+4H}\) | \(2M_{i}E+H\) | \(\textit{H}\) | \(\text {-}\) | \(User:2E+P \,\)\(Cloud:(2M_{i}+2)E+(M_{e}+2)P\) |
NVO-CP-ABE | \(\textit{2E}\) | \((2M_{i}+2)E+H\) | \(\text {-}\) | \(P+2\log _{2}n\) | \(User:1 \ Cloud:iE+(M_{e}+3)P\) |
PAB-MKS | \((3M_{i}+3)E+H\) | \((3M_{i}+3)E\) | \(\textit{H}\) | \(\text {-}\) | \(\textit{iE+2iP}\) |
DCDV | \((2i+3)E\)\(+(i+\log _{2}(i+1))H\) | \((M_{i}+2)E\) | \(\text {-}\) | \(P+2\log _{2}n\) | \((\log _{2}(i+1)+M_{i}+5)E+6P\) |
BC-SABE | \((4i+3)E\) | \((3M_{i}+1)E+H\) | \(\textit{H}\) | \(\text {-}\) | \(User:E \ Cloud:iE+(3i+2)P\) |
DUPH-BAAC | \((3M_{i}+2M_{e})E+H\) | \((2i+M_{i})E+H\) | \(\textit{H}\) | \(P+2\log _{2}n\) | \(User:E \ Cloud:(M_{i}+M_{e})P\) |