Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Figure 6

The time consumption of the DO when the leaf node is 5.