Research Article

A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing

Table 3

Comparison of computation complexity.

SchemeEncryptionDecryptionKey Generation
(Data owner)(User)

[2]
[4]
Ours