Research Article
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
Table 3
Running times (in milliseconds) of the main operations using JPBC Library [32] on a Windows 8.1 Core i7 2 GHz PC with 8 Go of RAM.
|