Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

Figure 2

Decryption time.