Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Figure 3

Secret verification time.