Research Article

Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption

Figure 4

User-side encryption running time comparison.