Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

Figure 3

Transformation time.