Table 7 Comparison of encryption modes.
Encryption method | Ciphertext access control | Resistance to conspiracy attacks | Re-encrypt | Traceable |
|---|---|---|---|---|
Xuan et al. | × | √ | × | √ |
Youliang et al. | √ | × | × | √ |
Feng et al. | √ | √ | × | √ |
Khan et al. | √ | × | × | √ |
This study | √ | √ | √ | √ |
Encryption method | Ciphertext access control | Resistance to conspiracy attacks | Re-encrypt | Traceable |
|---|---|---|---|---|
Xuan et al. | × | √ | × | √ |
Youliang et al. | √ | × | × | √ |
Feng et al. | √ | √ | × | √ |
Khan et al. | √ | × | × | √ |
This study | √ | √ | √ | √ |