Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Figure 4

The time consumption of the DO when the leaf node is 5.