Research Article

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating

Figure 4

Comparison of encryption algorithms and decryption algorithms.
(a)
(b)