Research Article
Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
Table 2
Computational overhead comparison.
| System | Encryption | Outsourcing decryption | User decryption (s) | Decryption | Predetected |
| [30] | | | | | [34] | | | 0 | [36] | | | = 0.72 | Ours | | | | = 0.21 |
|
|