Research Article
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
Figure 1
Simulation experiment. (a) Offline encryption. (b) Online encryption. (c) Outsourced decryption. (d) Local decryption.
(a) |
(b) |
(c) |
(d) |