Research Article
Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
Figure 3
Time cost of encryption and decryption with different numbers of attributes. (a) Encryption time of data owner. (b) Decryption time of the user side.
(a) |
(b) |