Research Article

A Distributed Access Control with Outsourced Computation in Fog Computing

Table 3

The decryption comparisons of computation cost.

SchemeThe cost of decryption

Literature [7]
Literature [9]
Literature [29]
Our scheme