Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Figure 4

Comparison of the computation time (in ms) of each algorithm in different schemes.