Research Article

A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing

Figure 8

Comparison of decryption performance with 50 attributes.