Research Article

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things

Figure 1

Simulation experiment. (a) Offline encryption. (b) Online encryption. (c) Outsourced decryption. (d) Local decryption.
(a)
(b)
(c)
(d)