Research Article

Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud

Figure 2

Comparisons of computation cost.
(a) Setup
(b) KeyGen
(c) Encryption
(d) Pre-process
(e) User-decrypt
(f) Trace