Table 3 Comparison of calculation costs for different schemes.

From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

Scheme

Original data

Ciphertext address

Attribute update

Ciphertext verification

Ciphertext decryption

OUAC

\(\textit{2E+4H}\)

\(2M_{i}E+H\)

\(\textit{H}\)

\(\text {-}\)

\(User:2E+P \,\)\(Cloud:(2M_{i}+2)E+(M_{e}+2)P\)

NVO-CP-ABE

\(\textit{2E}\)

\((2M_{i}+2)E+H\)

\(\text {-}\)

\(P+2\log _{2}n\)

\(User:1 \ Cloud:iE+(M_{e}+3)P\)

PAB-MKS

\((3M_{i}+3)E+H\)

\((3M_{i}+3)E\)

\(\textit{H}\)

\(\text {-}\)

\(\textit{iE+2iP}\)

DCDV

\((2i+3)E\)\(+(i+\log _{2}(i+1))H\)

\((M_{i}+2)E\)

\(\text {-}\)

\(P+2\log _{2}n\)

\((\log _{2}(i+1)+M_{i}+5)E+6P\)

BC-SABE

\((4i+3)E\)

\((3M_{i}+1)E+H\)

\(\textit{H}\)

\(\text {-}\)

\(User:E \ Cloud:iE+(3i+2)P\)

DUPH-BAAC

\((3M_{i}+2M_{e})E+H\)

\((2i+M_{i})E+H\)

\(\textit{H}\)

\(P+2\log _{2}n\)

\(User:E \ Cloud:(M_{i}+M_{e})P\)