Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Figure 5

The time consumption of the DO when the leaf node is 10.