Research Article

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

Figure 3

Time costs of different algorithms.
(a) Setup time
(b) Key generation time
(c) Encryption time
(d) Token generation time
(e) Decryption and partial decryption time
(f) Trace time with different number of users