Research Article

Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research

Figure 3

Time costs of ciphertext search. (a) Ciphertext index generation time. (b) Token generation time. (c) Ciphertext search time.
(a)
(b)
(c)