Research Article

Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks

Figure 8

Time costs on different devices. (a) Encryption time. (b) Decryption time. (c) GenToken time.
(a)
(b)
(c)