Research Article

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

Figure 3

Running time of each algorithm in both protocols.