Research Article

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating

Figure 5

Comparison of policy updating.