Research Article
[Retracted] Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption
Figure 7
Comparison of energy consumption in different stages. (a) User private key generation stage. (b) Data encryption stage. (c) Data decryption stage. (d) Revocation stage.
(a) |
(b) |
(c) |
(d) |