Research Article

A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing

Figure 3

Comparison of encryption performance with 10 attributes.