Research Article
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
Figure 3
Time costs of different algorithms.
(a) Setup time |
(b) Key generation time |
(c) Encryption time |
(d) Token generation time |
(e) Decryption and partial decryption time |
(f) Trace time with different number of users |