Research Article

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption

Figure 5

Computation cost of IBBE re-encryption key generation.