Research Article

Multi-Authority Criteria-Based Encryption Scheme for IoT

Figure 3

The value of key generation time with threshold t.